(Page 2 of 4)   < Prev  1 2 3 4  Next >

Category: System Security Management » Configuration

Added 2005-02-09
by GemiScorp Software Solutions
SafeSystem is a security program that allows you to prevent access to your personal and important files and folders, as well as protect and guarantee the integrity and well functioning of your system. SafeSystem can make your files and folders completely invisible, inaccessible or simply read-only. Furthermore, SafeSystem can prevent the change of configuration and the accidental (or even intentional) system files deletion or alteration, so your PC will be healthy

Added 2004-11-30
by Rick Crelia, rick@nbank.net
Sherpa is a tool for configuring and then checking system security via the console. Written in perl, it allows an admin to maintain a custom database of file and directory permissions and ownership attributes as local needs dictate. Any changes from the prescribed layout will be detected each time Sherpa is run. Also, Sherpa does some basic system checks (world-writable files, .rhosts and hosts.equiv files, etc.) that help the busy admin keep on top of a system.

PIKT - Problem Informant/Killer Tool
Added 2004-09-22
by Robert Osterlund, robert.osterlund@gsb.uchicago.edu
PIKT is a cross-categorical, multi-purpose toolkit to monitor and configure computer systems, organize system security, format documents, assist command-line work, and perform other common systems administration tasks. PIKT's primary purpose is to report and fix problems, but its flexibility and extendibility evoke many other uses limited only by your imagination.

Added 2004-04-30
by Johan Lindh
jailed implements a nonprivileged jailroot. It allows an environment to be specified, does std(in/out/err) redirection, and can restart a failed child.

SunGazer Packetfilter
Added 2003-12-15
by Marius Brehler
The SunGazer Packetfilter is a small and simple tool to set up firewall rules. It works with IPTABLES and is easy to use and configure.

Added 2003-10-21
by Matt Miller
elfcmp compares running processes to the their respective binary image to ensure that the process image in memory has not been tampered with after execution. This is useful for general security auditing purposes as other methods that rely strictly on checking disk image checksums are not entirely reliable if only the process image is being tampered with.

Java Object Inspector
Added 2002-12-17
by Jan P. Monsch, Compass Security
The Java Object Inspector is used for testing client Java applications or applets which talk to the server with serialized Java objects. This tool is inserted into a Java application to inspect and modify member variables of live Java objects before they are streamed to the network.

Traffic Control - Next Generation
Added 2002-10-21
by Werner Almesberger
Traffic Control - Next Generation (tcng) is a revision of the Linux network traffic control infrastructure that aims to make the configuration language less cryptic, and provide better interfaces for software and hardware accelerators. It also includes tcsim, a simulator for the traffic control subsystem, which can be used with old (tc) and new (tcng) configurations.

Added 2002-10-18
by Christian Laursen
Minimal-router is a Linux-based router containing only the neccesary tools to setup basic networking and firewalling. It aims to be easily configurable while staying as secure as the Linux kernel itself.

Toolkit for OpenSSH Key Administration
Added 2002-06-28
by Gianugo Rabellino
TOSKA (Toolkit for OpenSSH Key Administration) provides a way for network administrators to centralize their SSH key management. It can manage a database of public keys via a GUI (and an upcoming command line interface), dynamically enabling on a per-key, per-user, and per-host basis.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus