(Page 3 of 4)   < Prev  1 2 3 4  Next >

Category: Access Control » Server

Added 2001-10-22
by Camelot
Hark! is the world's first automated intelligent access control solution. Powered by Camelot's Network Intelligence technology, Hark! utilizes advanced discovery algorithms to analyze network events and deduce the functional structure of an organization, extracting and mapping the relationships between users and various network resources.

Added 2001-10-22
by rebby
rTables is a detailed, customizable iptables firewall for Linux 2.4.x, easily implemented on boxes with one to three network interfaces. It is currently set up to handle a single external LAN, single internal LAN, and a single internal DMZ.

cum proxy toolkit (cpt)
Added 2001-10-22
by toxic ocean
The cum proxy toolkit (cpt) contains a proxyscanner, a proxy extractor, a toip converter and some other tools to manipulate proxy databases. The proxyscanner scans a given database with servers. It tries to connect to each proxy and requests a sample webpage with a unique ID in it to verify if the proxy actually forwards pages, and not only replies with just a 200 http code. It also checks if the proxy forwards cookies, referers and user-agent info. The proxy extractor takes a (log)file as input, filters it, and outputs a database with potential proxy servers. The output database can then be feeded into the proxyscanner. The toip converter converts a proxylist (with names and/or ip's) to an ip-only list. This way you can filter out duplicate proxies in your list, plus it provides a pre-check by excluding all proxies that give a DNS resolve error.

Added 2001-10-22
by Stephen Martin
Digital-Phalanx is a Unix Security Daemon. Once installed on a machine and activated, it will only allow 'cleared' users from 'cleared' domains to exist in the server. It is primarily a point defense system for your Unix server. Digital-Phalanx is available in both a perl5 and a C++ version. The perl5 version which is coded in generic perl5 should run on most unix systems. It has been developed,tested and implemented upon BSDI 3.0 and OpenBSD 2.3 servers. The Perl5 implementation has the advantage of being reconfigurable in flight and being written in Perl5 should run as is .. straight from the .tar file.

EnGarde Secure Linux
Added 2001-10-22
by Guardian Digital, Inc.
A secure distribution of Linux that implements advanced security techniques. It can be used as a Web, DNS, e-mail, database, e-commerce, and general Internet server where security is a primary concern.

PortBlocker 1.00
Added 2001-10-22
by AnalogX
PortBlocker allows you to basically block the Internet port of most servers, making them unreachable to other computers on the Internet. This program is NOT a Firewall, but it will allow you to run a server that is only available on the local network, and will log any access attempts made by other machines that are attempting to use the blocked interface. By default, PortBlocker is configured to block the most common types of servers that might be on a system (FTP, HTTP, etc), so will not require any modification for most users. If you are running a special server of some sort, then you can easily add it's ports (either TCP or UDP) to it's list, and have them blocked and/or logged.

Added 2001-10-22
This code implements a reference monitor for the Linux kernel that authorizes the invocation of critical system calls. It is able to detect and block some buffer overflow attacks.

Cistron Radius Server
Added 2001-10-22
by Miquel van Smoorenburg
Cistron RADIUS is an authentication and accounting server for terminal servers that speak the RADIUS protocol. The Cistron Radius server is mostly compatible with Livingston's 'radiusd-2.1', except without the s/key or menu support. It has additional features such as multiple DEFAULT entries with fall-through, a session database (who is online), the ability to limit connections on a per-user basis, and much more.

Added 2001-10-22
by Natalino Picone & Matteo Colombo
XtRadius is a freeware radius server implementation and its main feature is that it can handle user accounting & authentication informations via external fully configurable scripts. In this way you can write your own authentication and accounting routines without having to patch the radius server yourself.

Password 97
Added 2001-10-22
by Vince Pannell, vincepan@vmpdev.com.au
If you are looking for a simple way to stop people getting access to any Programs or Windows Environment Properties, then check out Password 97. Password 97 is designed to allow Individuals or Network Administrators the ability to password protect the Windows Environment. Password 97 gives you the owner the ability to protect individual windows items such as Display Properties, Network Neighbourhood or Add and Remove Programs. Password 97 will also let you protect programs such as Internet Explorer, Netscape, Money, Outlook, etc.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus