(Page 5 of 10)   < Prev  1 2 3 4 5 6 7 8 9 10  Next >

Category: System Security Management » Linux

Added 2002-10-15
by John Newman
FilterTools is an easy to use SQL driven Web- based solution for keeping people out of an unsecured 802.11b wireless network or shared wired networks.

cipherfunk Patched Linux Kernels
Added 2002-07-03
by Paul Drain
cipherfunk Patched Linux Kernels provide patchsets that focus on optimizations, bugfixes, and security enhancements to the current stable Linux Kernel. They are suitable for workstation or high-end server use in both production and development environments.

Added 2002-05-06
by Edson Medina
ifmonitor is a network interface traffic logger and grapher for Linux. It does not depend on SNMP, and it is written in Perl/PHP. It uses MySQL to store its logs.

Mandrake Security tools
Added 2002-05-01
by Yoann Vandoorselaere
The Mandrake Security tools package is designed to provide a generic secure level for Mandrake Linux users. It allows you to select on a scale of 0 to 5 the amount of security you need. This packages includes several programs that run periodically to test the security of your system and alert you if necessary.

Medusa DS9
Added 2002-04-16
by Milan Pikula
Medusa DS9 is used to increase Linux's security. It consists of two major parts, Linux kernel changes and the user-space daemon. Kernel changes do the monitoring of syscalls, filesystem actions, and processes, and they implement the communication protocol. The security daemon communicates with the kernel using the character device to send and receive packets. It contains the whole logic and implements the concrete security policy. That means that Medusa can implement any model of data protection; it depends only on configuration file, which is in fact a program in the internal programming language, somewhat similiar to C.

CylantSecure: Linux Kernel Plugin
Added 2002-04-09
by Scott Wimer
CylantSecure is a complete security architecture that currently provides a security plug-in for the Linux kernel. It enables a user to protect and reject both known and novel attacks in real time. It makes use of a number of Open Source technologies. It provides an XML and GTK+ based administration interface, and secures all communication with OpenSSL. Our product is currently being released with support for 2.2 kernels on RedHat 6.x systems.

HAP Linux Kernel Patches
Added 2002-04-03
by hlein
HAP-Linux is a collection of security-related patches to the 2.2 kernel, designed to be applied after the Openwall Project patch. Includes various chroot(2) hardening, network stealth and bad-TCP-flag patches, ptrace(2) protections, and additional logging of various suspicious, unusual, or privileged events.

Fd Linux
Added 2002-03-12
by Adam Dosch
Fd Linux is a mini floppy distribution of Linux set to fit on 1 floppy disk (kernel and root fs are combined). The sole purpose of this floppy distribution is to provide new Linux users with low-end machines (such as a 386) a very useful set of networking related binaries that can be easily accessed at any time, and which can be used in almost any networked environment (libraries, colleges, offices, small home LANs, dorm rooms, etc.).

Extended Attributes and ACLs for Linux
Added 2002-03-12
by Andreas Grünbacher
Linux, in the tradition of UNIX-like operating systems, implements file system permissions using a rather coarse scheme. While this is sufficient for a surprisingly large set of applications, it is too inflexible for many other scenarios. For that reason, all the major commercial UNIX operating systems have extended this simple scheme in one way or the other. This is an effort to implement POSIX-like Access Control Lists for Linux. Access Control Lists are built on top of Extended Attributes, which can also be used to associate other pieces of information with files such as Filesystem Capabilities, or user data like mime type and search keywords.

Added 2002-03-08
by Void Technologies
LinVPN allows you to create a VPN (Virtual Private Network) from Linux to Linux. Normally both are gateways of a LAN, then the LANs behind them may access each other over an encrypted tunnel created by the software.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus