(Page 6 of 27)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >

Category: Access Control » Firewall

Added 2004-06-02
by Heiko Zuerker
Devil-Linux is a special Linux distribution which is used for firewalls/routers. The goal of Devil-Linux is to have a small, customizable, and secure Linux system. Configuration is saved on a floppy disk, and it has several optional packages.

Astaro Security Linux (Stable 5.x)
Added 2004-05-13
by astaro
Astaro Security Linux is a firewall solution. It does stateful packet inspection filtering, content filtering, user authentication, virus scanning, VPN with IPSec and PPTP, and much more. With its Web-based management tool, WebAdmin, and the ability to pull updates via the Internet, it is pretty easy to manage. It is based on a special hardened Linux 2.4 distribution where most daemons are running in change-roots and are protected by kernel capabilities.

Added 2004-05-07
by Fabio Yasusi Yamamoto
NatACL is a authentication daemon for NAT and Transparent Proxy. The authentication input is done by the browser, it will redirect any URL to a internal page, asking for login and password. If the login and password are correct, it will create a NAT rule to forward the traffic, or redirect to the proxy port ( in case of transparent proxy ).

PCX Firewall (CGI Web Frontend)
Added 2004-05-07
by James A. Pattie
PCX Firewall is an IPTables firewalling solution that uses Perl to generate static shell scripts based upon the user's configuration settings. This allows the firewall to startup quickly, as it does not have to parse config files every time it starts.

Burp proxy 1.22
Added 2004-05-06
by PortSwigger
Burp proxy is an interactive HTTP/S proxy server for attacking Web-enabled applications. It operates as a man-in-the-middle between the end browser and the target Web server, and allows the attacker to intercept, inspect, and modify the raw traffic passing in both directions. Text and hex editing may be performed on intercepted traffic. Downstream proxies are supported. Authentication may be done to downstream proxy and Web servers, using basic, NTLM, or digest authentication types.

Sentry Firewall CD-ROM
Added 2004-04-30
by Obsid
Sentry Firewall CD-ROM Version 1.0 is a Linux based bootable CD-ROM suitable for use as an inexpensive and easy to maintain Firewall or IDS(Intrusion Detection System) Node. The system is designed to be immediately configurable for a variety of different operating environments via a configuration file located on a floppy disk or a local hard drive.

Added 2004-04-14
by Peter da Silva
plugdaemon is a load-balancing "plug" proxy. It allows you to forward TCP connections to one or multiple hosts, using load balancing or failover, and to route the connections through an HTTPS proxy. Access control is done by source interface or by originating IP. Outgoing connections can be bound to a specific IP address.

Wolverine Firewall and VPN Server
Added 2004-04-05
by Joshua Jackson
Wolverine is a firewall and VPN server that is based on the Embedded Coyote Linux distribution of Linux. This product is intended as an alternative to commercial devices such as the Cisco PIX, the FireBox, etc. Wolverine features a hardened Linux 2.4-based stateful firewall along with IPSEC and PPTP VPN services. As it is intended to be an embedded solution, the overall installation size is roughly 8Mb.

Added 2004-03-26
by The Public IP ZoneCD has been created to help implement safe, free, wifi hotspots. NoCat dynamic fir
The Public IP ZoneCD has been created to help implement safe, free, wifi hotspots. NoCat dynamic firewall rules are used for user access and authentication. A transparent proxy sends all "Public" requests from NoCat through a content filter (Dansguardian) to block porn, hacker sites, extreme violence, illegal drugs, and other obscene and explicit Web sites. The content filter also blocks files extensions to protect your network from viruses, and restricts file sizes to save bandwidth.

Securepoint Firewall and VPN Server
Added 2004-03-25
by Lutz Hausmann
Securepoint Firewall and VPN Server is a high-performance application designed to offer full protection for network assets. The Security Manager offers a graphical user interface with many features, different configurations, and advanced reporting functions. The Securepoint server is a complete firewall and VPN software system with an operating system based on a secure Linux. VPN operation supports PPTP and IPSec (X.509 certificates, preshared, RSA signature). You can use the firewall on a standard PC with 2 to 16 network cards (including Ethernet, ADSL, ISDN). It is very easy to install and administer. The Securepoint Security Manager is available in English, German, and Spanish, and works in online and offline mode.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus