(Page 6 of 8)   < Prev  1 2 3 4 5 6 7 8  Next >

Category: Access Control » Network

X LineControl Client
Added 2001-10-22
by S. Fuchs
LineControl Clients allow you to remotely control the lines (e.g., internet connections) of a server running LineControl Server. xlc (X LineControl Client) supports controlling of multiple lines/automatic hangup, and has a small floating window displaying throughput information.

Form Scalpel
Added 2001-10-22
by curryman
"Form Scalpel" is designed to aid security professionals to assess the resilience of a web sites forms to various forms of attack. Supports HTTP/HTTPS, Proxy servers, Cookies, Java/javascript/vbscript/XML pages and forms - GUI interface. Detailed analysis of certificates and real-time manipulation of HTML data.

Netsaint/Nagios Console Monitor 0.52
Added 2001-10-22
by Stig H. Jacobsen
nsc is a curses-based console monitor for NetSaint and Nagios. It allows you to monitor Netsaint/Nagios services without the expense or availability of a GUI. It features realtime display of netsaint status, adjustable display frequency and display layout, and colouring/highlighting for troubled items. It has a clean and simple display and usage, displays all essential netsaint status info on a single screen, and should run anywhere with proper curses support.

Linux Router Project (LRP)
Added 2001-10-22
by Linux Router Project
A networking-centric micro-distribution of Linux. LRP is small enough to fit on a single 1.44MB floppy disk, and makes building and maintaining routers, access servers, thin servers, thin clients, network appliances, and typically embedded systems next to trivial.

Added 2001-10-22
by AnalogX
AnalogX PortMapper allows you to map any port on your computer to any IP address and port on another machine; not only that, you can limit access based on the incoming IP address! So, say for instance that you are using a proxy, and would like to be able to telnet from other machines; simple, just run PortMapper, and tell it to forward any request to port 23 (telnet) to the machine you want to access. Now, any time you telnet to your proxy server machine, it automatically forwards the data to the other machine! Or, do you run a webserver, and only want people from IP address you specify to connect? No problem, PortMapper can do that as well!

Added 2001-10-22
by Kazunori Fujiwara, fujiwara@rcac.tdi.co.jp Co-Author Arkadiusz Miskiewicz, misiek@pld.org.pl
tcpd is a complete replacement for the tcp_wrappers package which works with both IPv4 and IPv6. The API is fully compatible with tcp_wrappers.

Anti Spoofing rules for cisco-boxes
Added 2001-10-22
by Jens Hektor, hektor@rz.rwth-aachen.de
A perl script to setup anti spoofing rules and some more on cisco-routers based on the routing information.

Added 2001-10-22
by Doug Karl, kbridge@osu.edu
The KarlBridge package by Doug Karl. A program that runs on a PC with two Ethernet boards, turning the PC into a sophisticated, high-level, packet-filtering bridge. It can filter packets based on any specified protocol, including IP, XNS, DECNET, LAT, IPX, AppleTalk, etc.

IP Firewall Accounting (IPFA)
Added 2001-10-22
by Xie Huagang, xhg@gem.ncic.ac.cn
IP Firewall Accounting (IPFA) is software designed to reside on a Linux gateway box doing IP accounting and IP filtering. IPFA can do Virtual DMZ Setting, per-ip accounting, free IP setting, user management, per-month, per-day, and per-minute logging, MAC-IP binding, firewall rule setting, online user monitoring, and more.

Added 2001-10-22
by Intrinsic, intrinsic@hushmail.com
Secfingerd is a replacement for the standard finger daemon that comes with most UN*Xes. It allows each user to control whether-or-not they want to be fingered and if they do, what information about them is displayed as well as the formatting used. Secfingerd does not support empty and indirect queries. User's can stop themselves from being fingered by creating a ".nofinger" file in their home directory, this release of secfingerd also supports a global nofinger file which can be used to stop users such as "bin" from being fingered without putting a ".nofinger" file in "/bin".

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus