(Page 3 of 5)   < Prev  1 2 3 4 5  Next >

Category: Access Control » Applications

Added 2001-10-31
by Fyodor Yarochkin , Ofir Arkin
X is a logic developed from the various Active Operating System Fingerprinting methods discovered during the "ICMP Usage In Scanning" research project. Xprobe is a tool automating the X logic.

Form Scalpel
Added 2001-10-22
by curryman
"Form Scalpel" is designed to aid security professionals to assess the resilience of a web sites forms to various forms of attack. Supports HTTP/HTTPS, Proxy servers, Cookies, Java/javascript/vbscript/XML pages and forms - GUI interface. Detailed analysis of certificates and real-time manipulation of HTML data.

Added 2001-10-22
by Nathan Neulinger, nneul@umr.edu
CGIWrap is a gateway program that allows general users to use CGI scripts and HTML forms without compromising the security of the http server. Scripts are run with the permissions of the user who owns the script. In addition, several security checks are performed on the script, which will not be executed if any checks fail.

Sentry '98
Added 2001-10-22
by Softech
Sentry 98 allows you to take control of your windows 95 computer and set up Windows 95 user accounts for all potential users of your computer. Each has his or her own Desktop, Start Menu, Programs folder and other Win 95 folders. In addition, you can place restrictions on users to control use of the computer and minimise the risk that inexperienced users will accidentally corrupt or delete important files or configuration settings. Recovering the original setup can be costly in terms of both time and money.

The Lock 98
Added 2001-10-22
by Rob Boulden
Complete Windows 95 desktop protection for a stand-alone or networked workstation system. Features: Numerous Windows 95 System Policy items and new Netware network options. SimpleLock mode for quick-start locking of the system Multiple user capabilities 90 user-defined access levels for granting/restricting access to 5000 or more users User level protection including: Disable access to: My Computer, Network Neighborhood, Recycle Bin, Network Sharing Control, Network Setup, Device Manager, Display Settings, Printer Configuration Controls. System resource protection (Folder or file, including wild-carding) set to read only or no access Ability to restrict or allow access to individual applications, including the system tray and desktop Ability to configure virtual desktops and Start Menu Programs folders for each group level Automatically log-off users after a set amount of time Group level login time restrictions Netware groups used for user profile groups. No need to enter Netwere user names individually. User Profile database may be stored on a network resource for easy multi-station configuration User Profile wizard for easy Group level configuration Setup wizard for easy Lock configuration Security Wizard to increase security and simplify configuration Three levels of profile datafile encryption Documentation and help in RTF (Rich Text) format as well as Adobe Acrobat Reader PDF format Keep screen blanked between Splash screen and blankscreen during password entry Workstation monitoring and remote install and update via the The Lock's Network Tools Administrator-specific options for customizing multiple-user computer systems User-customizable settings for non-security related options Launch current screen saver on system lock Integrated DOS protection for boot-up security Integrated system-wide idle timer for automatic locking of the system after inactivity Hotkey support for commonly-used functions Password authentication via: Local password file; Novell Netware 3.12 / 4.1x NDS and Bindery; Windows NT Server validation; Centralized Windows 95 password validation (requires CrashCourseNetwork Validator) .

Added 2001-10-22
by Philipp Hoffmann
TimeWatcher was designed to control your computer's access in two ways: you can determine the period of time during which someone can use the computer and prevent further usage; and you can control which programs can be used.

Added 2001-10-22
by Anfibia
Watchman is a fast, simple, easy, inexpensive but effective security application that would probably be the kind of tool you are looking for to stop your kids from using a given program, or from changing your Windows' configuration. In addition, Watchman has proven to be a very interesting and effective tool for businesses or institutions that need to stop users/workers/students from wasting their time or from accessing to forbidden data.

Windows Enforcer
Added 2001-10-22
by Posum LLC
Windows Enforcer protects systems that are accessible to many people and require a consistent configuration and a consistent, limited selection of services such as public displays or computer labs. It is also great for child-proofing individual systems. This is accomplished by insuring that user specified tasks either never run, always run, or are allowed to run. It is easy to configure and requires little to no modifications to your current system configuration. Enforcer is being used successfully by school systems and corporations, big and small, around the world to effectivily protect their investment and keep their support costs low.

Windows Task Lock
Added 2001-10-22
by Posum, LLC
Windows Task Lock provides a simple and inexpensive, but effective way to password protect specified applications for Windows 95,98 or NT no matter how they are executed. Its security is easy to configure and requires little to no modifications to your current system configuration. Danish, English, French, German, Italian, Portuguese, Spanish, and Swedish language interface support. Administrator functions are enabled for site licenses.

Added 2001-10-22
by Guy Avidar
WinLock is the best way to lock your computer: you can hide all desktop icons and files, the 'Start' button, and TaskBar, or disable The HotKeys. Lock as many programs or directories of your choise. Include the option of locking all directories in just one click Lock all programs and directories except those you choose not to. Include the option of leaving all directories open for browsing. Disable the Mouse and Keyboard besides in WinLock. Lock the boot options the function keys,the menus etc' . All the new setting will remain when you run your Windows again, and couldn't be access without the right password.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus