(Page 11 of 16)   < Prev  6 7 8 9 10 11 12 13 14 15 16  Next >

Category: Utilities » System

RACF PC-based Utilities
Added 2001-10-22
by Nigel Pentland
The 'RACF' utilities are text processing programs which take an IRRDBU00 ASCII flat file download from RACF and produces as output text reports and depending on the program JCL which can be checked, transfered back to mainframe and submitted. Please refer to the web page for notes on using the RACF utilities, and for the RACF.ini file (not included in the ZIP file).

Added 2001-10-22
by Arne Vidstrom, arne.vidstrom@ntsecurity.nu
Edit the security event log in Windows NT 4.0 and Windows 2000! WinZapper is the first tool (as far as we know) that will let you remove lines in the security log without clearing the whole log. And it will let you do this while Windows is running.

Added 2001-10-22
by spender, spender@exterminator.net
Remote administration daemon for linux and BSD(tested on openbsd). Features password authentication, access-lists, a completely configurable interface, as well as secure internals.

Screen Logger
Added 2001-10-22
by Mikko Technology, support@mikkotech.com
Screen Logger is like a handycam for your screen. It can record everything your computer monitor displays on the screen. The main feature of Screen Logger is to capture your screen and log it into log files for you to view at any time. This is very important feature if you need to keep backups for your work, do some troubleshooting on your computer, or even if you just want to know what happens to your computer while you're away. By capturing screens and log them into log files will give you a figure on what happens to your computer.

Added 2001-10-22
by Lars Berntzon
SATOOLS is a set of tools geared to the management of a large number of similar systems, but where each may have its own subtle nuances. It will store tables detailing their configurations, hardware setup, cron jobs, what the /etc/motd looks like -- all facets of the administration of a machine.

Secure File Wrapper
Added 2001-10-22
by Timothy E. Hoff
SFW is a standardized, secure Unix command wrapper. SFW is meant to be a common wrapper program that can be used by administrators to give access to what would be root-only privileges, or commands, without needing to resort to wrapping each program individually. The idea behind SFW was to write a simple wrapper that was easy to deploy, and would avoid some of the more common pitfalls that result when people rehash this type of program.

Added 2001-10-22
by Michael Meskes
Watchdog is a daemon that checks a system's status to ensure its working. If programs in user space are no longer behaving the way they should, Watchdog will reboot the machine. This can be really handy for those remote machines which mysteriously seem to lock up when there is no one around to reboot them.

WSM: Web based System Monitor
Added 2001-10-22
by Dirk G.K. Mueller
WSM is a web accessible system monitor for Linux. It gives info on a variety of machine information, including load, modules loaded, memory info, users logged in, routing information, and a wide variety more.

Added 2001-10-22
by Fresh Software
Antigen is a program to automatically detect, clean and destroy the BOserver (Back Orifice Server) program for your Win95 machine. Antigen will only clean and detect Back Orifice and BO2k on Win95 and Win98 machines.

NTsu 2.0
Added 2001-10-22
by The Quimeras Company
NTsu is a software utility for Windows NT especially useful for administrators. NTsu allows you to run programs in the security context of any user in your system or domain (if you know the username and password, of course). NTsu also allows you to have simultaneously multiple desktops for different users, and you can switch from one to another.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus