(Page 3 of 5)   < Prev  1 2 3 4 5  Next >

Category: Replacement » Applications

Solaris kernel module
Added 2001-10-22
by Andreas Maier, andi@cosy.sbg.ac.at
A Solaris kernel module to emulate /dev/random and /dev/urandom known from Linux in Solaris. Use at your own risk.

Added 2001-10-22
by glub
Secure FTP is a client package that allows for a secure connection to be made to an FTP daemon via SSL.

Security SetUp II - Light
Added 2001-10-22
by Michael Moller
Security SetUp is a 'security shell' for Windows 9x and Windows NT that allows you to edit the security settings build into Windows by Microsoft. Security settings can also be accessed via PolEdit.exe, however the goal of Security SetUp is to make this task simple and uncomplicated. Security SetUp is very intuitive and comes with easy to use build in help. Security Setup is shareware.

Added 2001-10-22
by Wietse Venema
Postfix is Wietse Venema's attempt to provide an alternative to the widely-used Sendmail program. Sendmail is responsible for delivery of billions of e-mail messages daily. A stunning number. Postfix attempts to be fast, easy to administer, and secure, while at the same time being sendmail compatible enough to not upset existing users.

PortMap 4
Added 2001-10-22
by Wietse Venema
Replacement portmapper with access control. Makes it somewhat harder to attack your RPC daemons, for example to steal YP password maps or NFS file handles. Must be linked against a library produced with a recent tcp wrapper release (see above). Tested with SunOS 4.1.x. Also supports HP-UX 9.0, AIX 3.x (bsdcc compiler with -D_SUN), AIX 4.x and Digital UNIX (OSF/1). If you run SunOS 4, the securelib library (see above) is better because it can also cope with direct attacks on your RPC daemons (i.e. attacks without assistance from portmap).

Added 2001-10-22
by RL "Bob" Morgan, Roland J. Schemers III
fping is a ping(1) like program which uses the Internet Control Message Protocol (ICMP) echo request to determine if a host is up. fping is different from ping in that you can specify any number of hosts on the command line, or specify a file containing the lists of hosts to ping. Instead of trying one host until it timeouts or replies, fping will send out a ping packet and move on to the next host in a round-robin fashion. If a host replies, it is noted and removed from the list of hosts to check. If a host does not respond within a certain time limit and/or retry limit it will be considered unreachable.

Srsh Simplified Restricted Shell
Added 2001-10-22
Simplified Restricted Shell 0.1.3. Major purpose of this shell is to maintain `not permitted explictly then not allowed' policy on machines which provide shell access to users, which can not be trusted, while trying to keep KISS rule. Of course you should carefully check up and configure applications, which you allow your users to run, otherwise it still would be trivial to break your policy with badly configured pine or lynx for example.

NSBD - Not-So-Bad Distribution
Added 2001-10-22
by Dave Dykstra
NSBD, Not-So-Bad Distribution, is an automated Web-based distribution system that is designed for distributing free software on the internet, where users cannot trust the network and cannot entirely trust the maintainers of software. NSBD authenticates packages with GNU Privacy Guard (GnuPG) or "Pretty Good(Tm) Privacy" (PGP(Tm)) digital signatures so users can be assured that packages have not been tampered with, and it limits the maintainer to only update selected files and directories on the user's computer. NSBD's focus is on security, leaving as much control as is practical in the users' hands.

Added 2001-10-22
by Nikos Mavroyanopoulos, nmav@hellug.gr
mcrypt is a program for encrypting files or streams. It is intended to be a replacement for the old UNIX crypt. It uses well-known and well-tested algorithms like DES, BLOWFISH, TWOFISH, ARCFOUR, CAST-128, and more in several modes (CBC, CFB, etc.). It also has a compatibility mode with the old UNIX crypt and Solaris des.

Added 2001-10-22
by Brian Wellington, bwelling@xbill.org
Secure FTP (sftp) implements a file transfer protocol using ssh/rsh as the transport mechanism. When the client is invoked, a remote shell is spawned and the server is run. sftp is mainly useful over a secure ssh session since passwords are not exposed. It also has the advantage that no root access is required, since the server runs as a user process.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus