(Page 4 of 5)   < Prev  1 2 3 4 5  Next >

Category: Access Control » Applications

Added 2001-10-22
by Oscar Levi
BSIGN will verify and authenticate data files. In particular, it will validate executables and other binaries. It will embed a secure hash of the file contents in the file, and optionally sign this hash. Any change to the file will alter this value, and when checked again, the hash will not match. It works by modifying the target ELF file, by modifying the header section to accommodate a signature section.

Srsh Simplified Restricted Shell
Added 2001-10-22
Simplified Restricted Shell 0.1.3. Major purpose of this shell is to maintain `not permitted explictly then not allowed' policy on machines which provide shell access to users, which can not be trusted, while trying to keep KISS rule. Of course you should carefully check up and configure applications, which you allow your users to run, otherwise it still would be trivial to break your policy with badly configured pine or lynx for example.

Added 2001-10-22
by Mixter mixter@newyorkoffice.com
Fwmail is a small secure daemon for inetd that forwards incoming smtp traffic to another sendmail server, acting as a gateway, and optionally anonymizing the senders origin.

Password 97
Added 2001-10-22
by Vince Pannell, vincepan@vmpdev.com.au
If you are looking for a simple way to stop people getting access to any Programs or Windows Environment Properties, then check out Password 97. Password 97 is designed to allow Individuals or Network Administrators the ability to password protect the Windows Environment. Password 97 gives you the owner the ability to protect individual windows items such as Display Properties, Network Neighbourhood or Add and Remove Programs. Password 97 will also let you protect programs such as Internet Explorer, Netscape, Money, Outlook, etc.

Mouse Lock
Added 2001-10-22
by Segobit
Mouse Lock is a Windows95 based application designed to prevent unauthorized use of your computer.  The program simply traps your mouse inside a small button.  Your computer can trap or free the mouse at a specified time.  Mouse Lock disables special key combinations such as ALT_TAB, CTRL_ESC, CONTROL_ALT_DELETE and others.  The program has protection from rebooting and reseting your computer.

Added 2001-10-22
by Zhang Dehua
CodeSafe could protect your program, including Executable file(.EXE) and Dynamic Link Library(.DLL), from being cracked or run without your permission.

Lock & Key
Added 2001-10-22
by J.R. Mainwaring, james@solering.demon.co.uk
Lock & Key(TM) is a DLL that allows software developers to control user access to their applications. This can range from simple control of access to an entire application, to more refined control of access to individual application features, for instance the options available on an application's menu bar could be changed depending on which user has logged in. A facility is provided to allow supervisors to maintain the list of users and their individual access rights. Audit information such as last login time, last Password change time, number of failed logins etc. can be examined by supervisors. In a network environment, the Lock & Key(TM) user data file can be stored in a shared directory, thereby allowing access to be controlled on any machine with access to the file.

Added 2001-10-22
by Edwill Leighton, edwilll@hotmail.com
MausTrap is a small, but effective security program which prevents users from getting into Windows unless a password is supplied. It disables a few keys like the Windows key, Alt+Control+Del, Alt+Tab and a few others. It also hides the Taskbar and the Windows Desktop, so you can't use Windows until you supply the correct password, even if it gets hacked. Use MausTrap if you leave your computer unoccupied at times, and don't want others to use your computer with you not knowing.

Security Officer
Added 2001-10-22
by Eugene Mihailov, winsecoff@bigfoot.com
Windows Security Officer is an autonomous provider of log-on and resource restriction security integrated with, yet independent of, the Windows 95/98 operating system.  It has the capability of providing extremely strong, secure control of who can access the personal computer resources; and exactly what and when they can do while they have access to those computer resources.  If a users time limit has been set and it has been reached, the computer shuts itself off and that user cannot log-on again until their prescribed time range arrives. Windows Security Officer enables you to protect and totally control access to your personal computer. It offers administrative support for controlling which users are allowed to access your computer and the level of access each user may have. You can choose to restrict access to several Control Panel applet functions, including Display, Network, Passwords, Printer, and System. It's not all or nothing -- for example: you can allow a particular user access to your wallpaper settings but not allow them  to change your screen saver. You can also assign separate system profile folders to each user, providing each with their own custom desktop. You can additionally: disable Start menu items, hide your drives, disable the DOS prompt, hide desktop icons, and much more.

SuSE Secure Compartment 0.5
Added 2001-10-22
by Marc Heuse, marc@suse.de
This tool was written to securely run untrusted/insecure services. It has all options needed to make the impact of an successful intruder attempt on a service as small as possible.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus