(Page 2 of 3)   < Prev  1 2 3  Next >

Category: System Security Management » Console

HAP Linux Kernel Patches
Added 2002-04-03
by hlein
HAP-Linux is a collection of security-related patches to the 2.2 kernel, designed to be applied after the Openwall Project patch. Includes various chroot(2) hardening, network stealth and bad-TCP-flag patches, ptrace(2) protections, and additional logging of various suspicious, unusual, or privileged events.

Added 2002-03-27
by deskman@anfibia.net
Simple but powerful security tool to control the Desktop. Features: Hide Start Menu, Trap System keys, Hide desktop icons, Hide the clock, Disable "Right-click", Set password to shortcuts, more.

Added 2001-10-22
by Gandalf Elbrujo, bruj0@phreaker.net
Sportal is made for people that need to know what is going on in their systems. It monitors files that you select, for "hot words" that you also select, through a graphical interface. When a hot word is found in the file being watched, it will let you know. There is no restriction on the numbers of files or hot words. Major clean up, Fixed a memory leak. Added option to execute a command when a word is found. Added a Scroll Back buffer. There is now an option to turn off the icons and the window popping up. The configuration file has been made more readable. Debug output has been turned off. Random crash problems have been fixed. A new option to show all the lines that gets added to the file, like "tail -f", added. Compile bugfixes for Compaq Tru64, SCO Unixware and Solaris.

Added 2001-10-22
by Jonathan Leto, jonathan@leto.net
Perlnecklace is a wrapper for the perl binary to increase site-wide security. It has the ability to chroot, set resource limits, allow/disallow modules, and log to syslog.

Secure rm (srm)
Added 2001-10-22
by Matthew Gauthier, elleron@crosswinds.net
srm (secure rm) is a command-line compatible rm(1) which destroys file contents before unlinking. The goal is to provide drop in security for users who wish to prevent command line recovery of deleted information, even if the machine is compromised.

Added 2001-10-22
by Pedestal Software, general@pedestalsoftware.com
Intact is a system integrity assessment tool that detects changes to a system by comparing system components to a pre-established database. It features a central console, remote administration, and easy-to-use wizards. The NT version will detect changes in real time. All versions detect changes in files and users. NT/2000 versions detect changes in the registry, auditing, policy, and any LDAP-compliant directory.

Added 2001-10-22
by C&A Systems Security Ltd, steve@pcorp.u-net.com
COBRA is a unique information security management product and approach.... so unique that it leads in multiple disciplines: security risk analysis, iso17799 / bs7799 compliance, compliance with information security policies, security audit support, business continuity support, and so on.

Added 2001-10-22
by Sun Microsystems Inc, bruce-interest@sun.com
SENSS "Bruce" is a flexible, Java-based infrastructure that permits centralized security management of small, medium and large-sized intranets. The Bruce software provides you with a network service daemon that should be installed on each host in your network; these daemons are linked together in a hierarchy of trust.

Added 2001-10-22
by Marvin
Arping is an ARP level ping utility. It's good for finding out if an IP is taken before you have routing to that subnet. It can also ping MAC addresses directly. A rewrite that supports Libnet 1.1.x is included.

Serial line sniffer
Added 2001-10-22
by Warrior
slsnif is a serial port logging utility. It listens to the specified serial port and logs all data going through this port in both directions.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus