< Prev 1 2 3 4 5 6 Next >
Category: System Security Management » Filesystem
fileschanged is a command line file alteration monitoring tool that monitors sets of files and reports when they have changed. It can be used in shell scripts to take action when certain files have been altered.
MD5Guard is the client-server application used for remote monitoring of file consistency via a network. It uses MD5 hash for consistency checking. The program consist of two parts: MD5Server and MD5Client. The host running the MD5Server periodically receives connections from the hosts that run the MD5Client. During the session, the MD5Server sends to the clients names of files, and the clients respond with their MD5 hash. The list of file names is configurable on a per-client basis. Any abnormal behaviour or MD5 hash mismatch is logged via syslogd.
FSlint is a toolkit to find various forms of lint on a filesystem. At the moment it reports duplicate files, bad symbolic links, troublesome file names, empty directories, non stripped executables, temporary files, duplicate/conflicting (binary) names, and unused ext2 directory blocks.
The iiitAccessServer is a rule-based enterprise authorization system written in Java. It works as a server and is usable with any programming language able to open a socket. The server fetches its data from LDAP and stores it in optimized form in one or more MySQL databases, used as a persistent 2nd-level cache to achieve high performance. The entire system is designed to be scalable and fault-tolerant.
Easy Integrity Check System
Easy Integrity Check System is a tool for system administrators that performs filesystem integrity checks. It is easy to set up and use, and makes use of the mcrypt and mhash libraries for encrypting its database.
Easy Firewall Generator
Easy Firewall Generator is a PHP Web application that generates an iptables firewall script. The generated script is designed for a single system connected to the Internet or a system acting as a gateway/firewall for a small private network. The generator prompts recursively for a variety of options. When the selected options form a complete set, it generates and returns a ciommented firewall script based on those options. The generator includes documentation on iptables and each option.
LFT (formerly FFT) is an alternative traceroute program for displaying the route packets take to an IP network host/socket. Unlike Van Jacobson's traceroute, which is available on almost every platform today, LFT uses TCP in order to elicit ICMP TIME_EXCEEDEDs or other IP route data. As a result, LFT often executes much faster and sees behind some configurations of firewalls. Its stateful engine lets the user know when it encounters a stateful firewall or other interesting conditions. It also does AS number and netblock name lookups en route. Most importantly, LFT can trace specific TCP-based protocol routes (not just IP) to assist network engineers with manual fault isolation of network application problems.
Recon is a general SSL watchdog, checking for common, certificate-related errors in SSL-enabled services. Provide it a list of SSL services for which you are responsible, run it periodically, and Recon will warn you of impending certificate expirations, mismatched certificate names, and unavailable services.
Weblog is a parsing system for the log data which is generated by the Apache module mod_log_mysql. It generates detailed statistical data from the raw log, including resolving of hostnames. The statistical data is written to a relational database, making almost realtime custom-formatted dynamic statistics possible, using something like PHP or Zope.
Webshell is a remote UNIX shell that works via HTTP. The client script provides a shell-like prompt, encapsulating user commands into HTTP POST requests and sending them to the server script. The server script extracts and executes commands and returns STDOUT and STDERR output. Features include command line history support, file upload/download, and it can work through an HTTP proxy server.
Browse by category