(Page 4 of 5)   < Prev  1 2 3 4 5  Next >

Category: Access Control » File System

Gatekeeper Folder Guardian
Added 2001-10-22
by Gerald A. Wann, photonuv@kudos.net
Gatekeeper is a Win95/98 application intended to provide data security and protection for sensitive files on your computer. It accomplishes this by applying a "folder lock" to almost any folder that you wish to protect. While a folder is locked, the files inside are unaccessible to the Windows95/98 Operating System and the Explorer shell. They are also unaccessible from the DOS command line. Gatekeeper is not destructive of your data. In fact, Gatekeeper never touches the data itself, but only the folder where the data is located. Once a folder is restored to a normal (unlocked) state, your data again becomes accessible to Windows or any other application.

Added 2001-10-22
by GlobeSoft, support@globesoft.com
The SecureExplore ensures that private information is kept private. On most corporate networks and home computers, usually more than one person can access the file system (e.g. IT personnel) and thereby have access to private information. With the SecureExplore you can password protect your files with a 128 bit secret key. Without that key it is almost impossible to decrypt any information previously encrypted using that key. The SecureExplore is used to encrypt/decrypt all kind of files from the Windows shell (e.g. Explorer.exe and Find.exe). The program uses a 128 bit secret key algorithm to let a user (or group of users) encrypt/decrypt sensitive information that no one else should have access to. There are other programs around that let you do this, but the SecureExplore has been developed to be extremely easy to use from within the Windows shell.

Added 2001-10-22
by Henrik Edlund, henrik@edlund.org
Drall is a script which allows users to access their directories and files remotely without the need of using insecure FTP and telnet. It enables the user to treat the remote file system as if it was on their local hard disk trough a normal web browser. The interface resembles the well known Norton Commander (of DOS fame) and Midnight Commander (of UNIX fame). A dual-frame interface makes it easy to see an overview of the file system and the modular design means you only use the features you need. Drall is written in Perl for easy customization and expansion.

Added 2001-10-22
by Kevin McAleavey, kevinmca@nsclean.com
ShareClean is security software for Cablemodems/xDSL. ShareClean is free software that allows you to control Win95 file sharing to prevent access to your drives by other high speed internet users while online. When you connect to high speed internet services through an ethernet card (such as Cable modems, telco xDSL services or through a LAN), if your machine has "file and printer sharing" enabled (NETBEUI/LANMAN), other users can connect to your machine and read, write, copy or delete anything on any of your drives. This FREE software from Privacy Software Corporation, makers of NSClean and IEClean Internet Privacy Software allows you to turn the sharing on and off as desired. Because of the way Windows95 works however, this software must reboot your machine each time to make the changes take effect. This software however is safe, effective, easy to use and does the job of protecting your system's contents against unauthorized outside access.

Added 2001-10-22
by Cursor Arts
Security-oriented desktop environment for Windows 95/98/NT offers a wealth of options which may be used alone, or in conjunction with other security measures, to control access to sensitive materials, hide confusing and irrelevant items from selected users, ease training tasks, etc. Customizable interface, file management, zip/unzip, password protection, delayed launch, disk spanning, and more.

RSBAC (Rule Set Based Access Control)
Added 2001-10-22
by Amon Ott, ao@rsbac.org
RSBAC is a flexible, powerful and fast open source access control framework for current Linux kernels, which has been in stable production use since January 2000 (version 1.0.9a). All development is independent of governments and big companies, and no existing access control code has been reused. The standard package includes a range of access control models like MAC, RC, ACL (see below). Furthermore, the runtime registration facility (REG) makes it easy to implement your own access control model as a kernel module and get it registered at runtime.

POSIX Access Control Lists (ACLs) for Linux
Added 2001-10-22
by Andreas Grünbacher, a.gruenbacher@computer.org
Linux, in the tradition of UNIX-like operating systems, implements file system permissions using a rather coarse scheme. While this is sufficient for a surprisingly large set of applications, it is too inflexible for many other scenarios. For that reason, all the major commercial UNIX operating systems have extended this simple scheme in one way or the other. This is an effort to implement POSIX-like Access Control Lists for Linux.

Folder Guard
Added 2001-10-22
by WinAbility
Folder Guard allows you to selectively hide files, folders and restrict access to other resources. Makes folders invisible to any application, including Explorer, MS Office, MS-DOS prompt, common dialogs, etc. Provides password protection, user-dependent configurations. Highly customizable and user friendly. For personal systems or corporate networks.

File Protector
Added 2001-10-22
by Mikko Adhipurna Jodana, mikkoaj@mikkoaj.hypermart.net
File Protector is a utility to protect your files and or folders. Protecting can be done in various ways. You can hide them, make them undeleteable, unrenameable, unreadable, unmodifiable, unappendable, unexecutable, just make them invisible, or just keep their attributes as is (cannot be changed). Both files and folders including the sub- directories inside them can be protected. WILD CARDS are allowed. With the wild cards feature, you can protect, for example all EXE or DLL files to be unmodifiable and unappendable. And you may also set all files to have their attributes unmodifiable, so keeping read only files remain read only, hidden files remain hidden. Or for certain files or folders you want them to be unseen, as if they didn't exist, you can do it too! Besides, you can protect log files of applications (such as KeyKey) to continue logging, yet cannot be accessed by unauthorized user. File Protector works silently in background.

Security Administrator For Windows 95/98
Added 2001-10-22
by Kirill Vasilev, harpygroup@bigfoot.com
Restrict access to your computer with Security Administrator for Windows 95/98. This password-protected security utility enables you to impose a variety of access restrictions to protect your privacy and stop others from tampering with your desktop. You can deny access to each individual component of several Control Panel applets, including Display, Network, Passwords, Printers, and System. You can disable your boot keys, DOS windows, Registry editing, and network access. Hide your desktop icons, individual drives, Start menu items, or even the entire taskbar. You can also apply password protection to Windows and restrict users to running specific applications only. Security restrictions can be applied universally or just to specific users. You'll find the program interface very easy to negotiate. Excellent online help is available.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus