(Page 5 of 16)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >

Category: Utilities » System

ClairVoyanT SysAdmin (CVTSA)
Added 2003-12-29
by Ardoino Paolo
CVTSA is a tool for GNU/Linux written in C that allows a user to run any command he wants on his Linux box even if he is far from his computer. CVTSA works as a shell but receives commands via email (email could be sent from a standar mailbox or from wap or some societies services that allow to send emails as SMS). There are some security features that make CVTSA quite safe. First of all the user has to choose a password (that he has to write in all emails(before commands) and when he starts CVTSA) so the ClairVoyanT SysAdmin can recognize emails and none else can run commands. Then there is a command wrapper file where the user can set denied commands and running policies. A mail wrapper allows a the user to choose from which email addresses accept commands.

Added 2003-12-23
by yikiru
ShoStats is a reimplementation of phpSysInfo in Perl, useful for running from crontab and outputting the stats to a PHP include file, which can then be displayed on a hosting account. It is also more modular and configurable, including modules to support both Linux and OpenBSD, an output module for PHP include files, and transfer modules for output to stdout (which can be redirected or piped) and uploading to an FTP server.

Login Anomaly Detection System
Added 2003-12-10
by Fred
The Login Anomaly Detection System (LADS) detects anomalies in logins and logouts and is able to perform various actions in response.

Added 2003-12-09
by omen
Enforcer is a Linux security module designed to help improve integrity of a computer running Linux. The Enforcer provides a subset of Tripwire-like functionality. It runs continuously and as each protected file is opened its SHA1 is calculated and compared to a previously stored value. The Enforcer is designed to integrate with TCPA hardware to provide a secure boot when booted with a TCPA enabled boot loader. TCPA hardware can protect secrets and other sensitive data (for example, the secrets for an encrypted loopback file system) and bind those secrets to specific software.

CommNav Systems Navigator
Added 2003-12-05
by CommNav Inc
Based on CommNav's Navigator portal architecture, Systems Navigator lets you administer your entire network via a secure Web interface. It helps protect your infrastructure with a set of monitoring and metric trending tools including Big Brother, Orca, Nessus, Integrit, and Larrd. The portal utilizes LDAP to store site-specific preferences for SysNav components. These preferences are templated and then used by SysNav's middle layer to generate Cfengine and component configuration files.

Log Watcher
Added 2003-12-02
by Artur R. Czechowski
lwatch is a log parser/analyzer written in C with the PCRE library. It is small and efficient. You are able to define your own colors using regexp patterns. The biggest advantage compared to other tools written in Perl is its speed.

Nas Groper
Added 2003-11-26
by bog22
The Nas Groper is a CGI application written in Perl. It depends on the Net-Snmp suite to retrieve SNMP OID variables from Cisco network access servers. It is a useful tool for Internet Service Providers to poll their Cisco NAS appliances for information on who is logged in, from where, and for how long. It also gives other valuable information on system operating variables.

Added 2003-11-26
by Michele Fadda
Jmon is a system monitor with server and client programs to monitor ethernet interface statistics, memory and swap status, CPU load, and the status of TCP connections. At the moment, it works only on Linux systems. For writing the rrd database, it uses JRobin classes.

Added 2003-11-26
by Krzysztof Gibas
scr_ipfm is a PHP script which graphically displays the amount of data downloaded by users in a local network. To do this, it uses logs generated by the ipfm program (available at http://robert.cheramy.net/ipfm/). scr_ipfm features the ability to sort by in-coming data size, out-going data size, total data size, or host. Daily, monthly, annual, and global statistics are gathered.

Added 2003-11-24
by R. Bernstein
ps-watcher periodically a gets a list of process names via ps. A configuration file specifies a list of Perl regular-expression patterns to match the processes against. For each match, a Perl expression specified for that pattern is evaluated. The evaluated expression can refer to variables which are set by ps and pertain to the matched process(es), including the amount memory consumed by the process, or the total elapsed time. If the Perl expression for a matched pattern evaluates true, then an action can be run such as killing the program, restarting it, or mailing an alert.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus