(Page 4 of 8)   < Prev  1 2 3 4 5 6 7 8  Next >

Category: Network Utilities » Tunneling

Added 2001-12-12
by jerome etienne
Yavipind is a secure tunnel (2 peers securely forwarding packets toward each other). It forwards any kind of packet (IPv4, IPv6, or other) sent over the virtual point-to-point device (e.g., tun0). It runs in Linux userspace.

CHX-I Universal Application Firewall and Intrusion Detection Engine.
Added 2001-12-06
by IDRCI Inc.
CHX-I is a TCP Application firewall. New in version 1.7: - SSL taffic analysis engine allows for in-transit TCP payload firewalling - SSL server side transparent encryption allows encryption of TCP application services - In-transit TCP packet data modification allows for manipulation of sensitive or undesired data - Asynchronous reverse data flow search allows for traffic direction specifications - Multiple engine actions on traffic flow such as Drop, Log and Replace

Added 2001-10-31
by Calle Laakkonen, calle.laakkonen@saunalahti.fi
Gnome SSH is a clone of kssh, the ssh frontend for kde. It keeps track of the sites you access with username and port information.

Added 2001-10-24
by Ralf S. Engelschall, rse@engelschall.com
mod_ssl provides provides strong cryptography for the Apache 1.3 webserver via the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1). It is based on the SSL/TLS toolkit OpenSSL and supports all SSL/TLS related functionality, including RSA and DSA/DH cipher support, X.509 CRL checking, etc. Additionally it provides special Apache related facilities like DBM and shared memory based inter-process SSL session caching. per-URL SSL session renegotiations, DSO support, etc.

Serve Command
Added 2001-10-22
by Jason Jordan, bear@bkis.net
This program is based off of Netcat. This program allows multiple connections while Netcat only allows one and is a bit easier to use. Run this program on any NT machine to open a remote shell on any port. You can start the program hidden (/h) and also assign it what port to listen on(default is 2323). Once the program is listening telnet into the computer on that port and you have a shell(cmd) environment waiting for you. The shell will have the same permissions as the user who started the program.

Added 2001-10-22
by INTELICOM, Security software company
INTELICOM TUNNEL HIGH SECURITY VPN FOR AFORDABLE PRIZE The Intelicom Tunnel enabled you to transfer sensible data over public networks, like Internet, in a secure manner. Intelicom Tunnel uses strong encryption protocols and standard certificates for encryption and authentication. In addition all data is also compressed and in this way the throughput of the connection is boosted by factor of 4 for most text oriented protocols. Intelicom Tunnel product is a 32-bit Windows NT application which runs like a service application on the server side of the VPN (virtual private network) and like a normal Win32 application on the client side of the tunnel. In this way the solution is very easy to install and support.

Added 2001-10-22
by COTSE, webs@cotse.com
Leapfrog will anonymize and redirect (bounce) any port. It can be used to work around firewall configuration and other issues requiring a port redirect. For example, you have a firewall that does not allow telnet (23), but it does allow http (80). Set leapfrog up on the other side of the firewall to listen on port 80 and send to 23, then telnet to port 80 of the leapfrog machine and you will ricochet to the machine you wish to connect. You will have the Leapfrog machines' IP and MAC addresses. It supports unlimited users (well, limited by memory).

T.U.T 1.1
Added 2001-10-22
by Vincent Amoroso, vja2@cornell.edu
T.U.T. is a simple UDP and TCP tunneler which can be run in client and server modes, and supports RC4 Encryption with keys up to 4096 bits. In client mode, T.U.T. listens for UDP and connects on TCP, in server mode it listens for TCP and connects on UDP. T.U.T. can Tunnel either UDP on TCP or TCP on UDP. This combination is ideal for by-passing UDP blocked firewalls if you want to run Quake or ICQ, and have an accessible server outside of the firewall.

Added 2001-10-22
by Christer Weinigel and Richard Levitte
FISH is a SSH client for VMS.

Added 2001-10-22
by Dan Burcaw
install-ssh is a tool that downloads, compiles, and installs RPMS of the latest version of SSH (Secure Shell) 1.2.x.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus