< Prev 6 7 8 9 10 11 12 13 14 15 16 Next >
Category: System Security Management
Honeynet Security Console
Honeynet Security Console is an analysis tool to view events on your personal honeynet. It gives you the power to view events from Snort, TCPDump, Firewall, Syslog and Sebek logs. It also allows you to correlate events from each of these data types to have a full grasp of the attackers' actions.
The Centron IPTables Firewall Gui is an object oriented, database driven, windows interface to linux IPtables firewall rules.
DiskLogon, like a Smart Card logon, is a software that enables you to log on to your computer with a removable disk. DiskLogon saves you the trouble of entering your user name and password every time you log on. All you have to do is to plug in your removable disk, and you can log on to your computer quickly and safely. When you plug out your removable disk, your computer will automatically lock up you're your safety.
tinysofa enterprise server
tinysofa enterprise server is a secure server targeted enterprise grade operating system. It is based on Trustix Secure Linux and includes a complete distribution port to Python 2.3 and RPM 4.2, an overhauled PAM authentication system providing system-wide authentication configuration, the latest upstream packages, the replacement of ncftp with lftp, the addition of gdb and screen, feature additions to the swup updater that provide multiple configuration file support, user login FTP support, enable/disable support, variable expansion support (allows multiple architectures), and many enhancements.
e-Surveiller is a powerful user-activity monitoring, logging and real-time surveillance software package. With it, you can monitor the activities of several computer users on standalone computers, on a local area network and on remote computers across the Internet. You view the screens of monitored users on a LAN or across the Internet in real-time! and it empowers you to save screen snapshots at any time. It stealthily records all keystrokes, web site visits, AOL, AIM,
SecureAware is an information security management intranet for creating and communicating business-level security policies, procedures and awareness programs. It drastically reduces the time and effort required to perform these tasks because it does not rely on text-based templates. Awareness content is automatically generated from your specific policy rules, combined with built-in generic security lessons.
Protect your computer from Internet worms and hackers' attacks, which become possible due to the operational system and software vulnerabilities ("exploits"). Neither antiviruses, nor firewalls can protect from exploits. Only Anti-Cracker Shield, a multilevel security system is able to cope with all known and unknown versions of "exploits". It is possible and is necessary to protect from hackers!
MaxPatrol is a professional network security scanner distinguished by its uncompromisingly high quality of scanning, optimized for effective use by companies of any size (serving from a few to tens of thousands of nodes). It supports vulnerability testing for servers with non-standard configurations, intelligent recognition of vulnerabilities in known (and custom)web-server scripts, full identification of RPC services and more.
Wasabi is a log monitoring program, designed to watch a log file for lines matching user defined regular expression and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports. Additionally, uninteresting fields in the log lines (such as PID numbers) can be masked with the standard regular ex
Devil-Linux is a special Linux distribution which is used for firewalls/routers. The goal of Devil-Linux is to have a small, customizable, and secure Linux system. Configuration is saved on a floppy disk, and it has several optional packages.
Browse by category