(Page 4 of 5)   < Prev  1 2 3 4 5  Next >

Category: Replacement » Applications

Added 2001-10-22
by Nadeem Riaz, nads@bleh.org
Psftp is basically an ftp-like program that uses ssh 1.x as its backend. Psftp provides a cli ftp-like interface on top of scp and ssh.

Added 2001-10-22
by Intrinsic, intrinsic@hushmail.com
Secfingerd is a replacement for the standard finger daemon that comes with most UN*Xes. It allows each user to control whether-or-not they want to be fingered and if they do, what information about them is displayed as well as the formatting used. Secfingerd does not support empty and indirect queries. User's can stop themselves from being fingered by creating a ".nofinger" file in their home directory, this release of secfingerd also supports a global nofinger file which can be used to stop users such as "bin" from being fingered without putting a ".nofinger" file in "/bin".

Added 2001-10-22
by Nadeem Riaz, nads@bleh.org
Psftp is basically an ftp-like program that uses ssh 1.x as its backend. Psftp provides a cli ftp-like interface on top of scp and ssh.

Osh - Operator Shell
Added 2001-10-22
by Mike Neuman
The Operator Shell (Osh) is a setuid root, security enhanced, restricted shell for providing fine- grain distribution of system privileges for a wide range of usages and requirements.

Added 2001-10-22
by Wietse Venema
This is a rpcbind replacement with access control in the style of the tcp/ip daemon wrapper (log_tcp) package. It provides a simple mechanism to discourage remote access to the NIS (YP), NFS, and other rpc services. It also has host access control on IP addresses. Note that the local host is considered authorized and host access control requires the libwrap.a library that comes with recent tcp/ip daemon wrapper (log_tcp) implementations. If a port requests that are forwarded by the rpcbind process will be forwarded through an unprivileged port. In addition, the rpcbind process refuses to forward requests to rpc daemons that do, or should, verify the origin of the request: at present. The list includes most of the calls to the NFS mountd/nfsd daemons and the NIS daemons

Added 2001-10-22
by Laurent Demailly
sfingerd is a secure replacement for the standard unix finger daemon. The goal is to have the smallest and safest code.

SRA (Secure RPC Authentication for TELNET and FTP)
Added 2001-10-22
by Texas A & M University
This package provides drop in replacements for telnet and ftp client and server programs, which use Secure RPC code to provide encrypted authentication across the network, so that plaintext passwords are not used. These programs require no external keyserver or ticket server and work equally well for local or internet wide connections.

Added 2001-10-22
by Scott M. Ballew
This version of tftpd is hacked from the 4.3 Reno tftpd. The author modified original source code since all of the versions that did a chroot() were unable to then syslog who got what file because of a rather obnoxious subtlety in the way 4.3 syslog works. This version has several improvements. 1.) chroot() to a restricted subdirectory. 2.) syslog() logs all accesses (and failures) to include the accessor, the file, and the access type. 3.) likely to have the ability to control which files or subdirectories of the tftp directory were accessible to which clients based on the incoming IP address.

Added 2001-10-22
by Cornell University
A network routing daemon that understands the BGP, EGP, RIP RIP II, OSPF, and HELLO protocols. This version of gated is more configurable than the routed program that comes with most UNIX systems and can be useful when constructing firewalls. This replacement also avoids a number of security vulnerabilties historically present in versions of routed(8).

Added 2001-10-22
by Mike Shanzer
This is a more security functional version of fingerd than is shipped with some older versions of UNIX. This version offers: logging, access control lists, for restricting finger requests to certain hosts and certain users, and a message of the day file.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus