(Page 5 of 5)   < Prev  1 2 3 4 5 

Category: Access Control » File System

Virtual Vault
Added 2001-10-22
by Eric Z. Maass, inquire@techniclabs.com
Virtual Vault is, as it appears to be, a vault for your personal computer. Just the same way that you may keep a vault in your house or bank to keep belongings safe, VV is a vault for your computer. VV is designed to keep your data belongings safe and locked up. As with a standard safe, VV displays an electronic keypad on start-up. The electronic keypad will wait for you to enter your Access Code. Once you've entered your Access Code, you are inside the vault. Once inside the vault, you can add files to the vault, or remove files that you previously put in the vault.

Added 2001-10-22
by Shetef Solutions Ltd., Support-WSI@Shetef.com
Supply single and multi-user protection against intruders from accessing items you choose to protect. Protection is done in four levels, completely hiding files and folders, blocking any access to the files, allowing files just read-only access, or monitor file and data usage. Intruders log is collected to keep track of unwanted attempts to violate security. Can be activated also in stealth mode.

LCAP 0.0.3
Added 2001-10-22
by Spoon, spoon@ix.netcom.com
LCAP allows a system administrator to remove specific capabilities from the kernel in order to make the system more secure. LCAP modifies the value in the sysctl file /proc/sys/kernel/cap-bound.

Added 2001-10-22
by The A.R.G.O.N., theargon@theargon.com
This program can restrict access to certain things, not allow anything to be deleted, altered. Can monitor what the user does. Lock up the computer. Allow only you to reboot the system and more.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus