< Prev 1 2 3 4 Next >
Category: System Security Management » Configuration
SafeSystem is a security program that allows you to prevent access to your personal and important files and folders, as well as protect and guarantee the integrity and well functioning of your system. SafeSystem can make your files and folders completely invisible, inaccessible or simply read-only. Furthermore, SafeSystem can prevent the change of configuration and the accidental (or even intentional) system files deletion or alteration, so your PC will be healthy
Sherpa is a tool for configuring and then checking system security via the console. Written in perl, it allows an admin to maintain a custom database of file and directory permissions and ownership attributes as local needs dictate. Any changes from the prescribed layout will be detected each time Sherpa is run. Also, Sherpa does some basic system checks (world-writable files, .rhosts and hosts.equiv files, etc.) that help the busy admin keep on top of a system.
PIKT - Problem Informant/Killer Tool
PIKT is a cross-categorical, multi-purpose toolkit to monitor and configure computer systems, organize system security, format documents, assist command-line work, and perform other common systems administration tasks. PIKT's primary purpose is to report and fix problems, but its flexibility and extendibility evoke many other uses limited only by your imagination.
jailed implements a nonprivileged jailroot. It allows an environment to be specified, does std(in/out/err) redirection, and can restart a failed child.
The SunGazer Packetfilter is a small and simple tool to set up firewall rules. It works with IPTABLES and is easy to use and configure.
elfcmp compares running processes to the their respective binary image to ensure that the process image in memory has not been tampered with after execution. This is useful for general security auditing purposes as other methods that rely strictly on checking disk image checksums are not entirely reliable if only the process image is being tampered with.
Java Object Inspector
The Java Object Inspector is used for testing client Java applications or applets which talk to the server with serialized Java objects. This tool is inserted into a Java application to inspect and modify member variables of live Java objects before they are streamed to the network.
Traffic Control - Next Generation
Traffic Control - Next Generation (tcng) is a revision of the Linux network traffic control infrastructure that aims to make the configuration language less cryptic, and provide better interfaces for software and hardware accelerators. It also includes tcsim, a simulator for the traffic control subsystem, which can be used with old (tc) and new (tcng) configurations.
Minimal-router is a Linux-based router containing only the neccesary tools to setup basic networking and firewalling. It aims to be easily configurable while staying as secure as the Linux kernel itself.
Toolkit for OpenSSH Key Administration
TOSKA (Toolkit for OpenSSH Key Administration) provides a way for network administrators to centralize their SSH key management. It can manage a database of public keys via a GUI (and an upcoming command line interface), dynamically enabling on a per-key, per-user, and per-host basis.
Browse by category