(Page 5 of 5)   < Prev  1 2 3 4 5 

Category: Replacement » Applications

Added 2001-10-22
by Patrick Powell
The LPRng software is an enhanced, extended, and portable implementation of the Berkeley LPR print spooler functionality. While providing the same interface and meeting RFC1179 requirements, the implementation is completely new and provides support for the following features: lightweight (no databases needed) lpr, lpc, and lprm programs; dynamic redirection of print queues; automatic job holding; highly verbose diagnostics; multiple printers serving a single queue; client programs do not need to run SUID root; greatly enhances security checks; and a greatly improved permission and authorization mechanism. For users that require secure and/or authenticated printing support, LPRng supports Kerberos V and/or PGP authentication methods. Additional authentication support is extremely simple to add.

Added 2001-10-22
by Clyde Hoover
Npasswd is a pretty-much-plug-compatable replacement for passwd(1). This version incorporates a password checking system that disallows simple-minded passwords.

Added 2001-10-22
by Anders Ellefsrud
This package consists of two parts. One server based passwd/chsh/chfn replacement, and a server based /etc/group editor which gives each and every user the ability to privately manage one group on his own. Requires perl.

xping 2.1
Added 2001-10-22
by Todd Allen
xping presents a list of computer systems with a graphic indication of whether or not each system is alive (that is, responsive to ICMP ECHO_REQUEST datagrams or ``pings''). Each system in the list is checked automatically with a period which can be controlled with command line arguments or X11 resources.

Added 2001-10-22
by AnalogX
AnalogX HyperTrace is a GUI version of traceroute, which shows you the route that information travels from your machine to another machine on the internet. HyperTrace is also faster, and not just a little bit; an average of 20-30x faster than before. It displays each hop, machine name, machine response time, and the route TTL.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus