(Page 6 of 7)   < Prev  1 2 3 4 5 6 7  Next >

Category: Access Control » user privileges

Osh - Operator Shell
Added 2001-10-22
by Mike Neuman
The Operator Shell (Osh) is a setuid root, security enhanced, restricted shell for providing fine- grain distribution of system privileges for a wide range of usages and requirements.

Added 2001-10-22
by Pekka Riikonen
This program allows you to control the types of terminals logging into your system. It also has an option to set the timing.

Omniquad MicroManager
Added 2001-10-22
by Omniquad
MicroManager applies a pre-emptive approach to how your computers are utilized: by interacting with the user when unsolicited or unpredicted activities occur, it protects your users and systems. Activity control and monitoring covers all aspects of computer usage and includes application, document and Internet activities. Each situation can be dealt with accordingly to your usage policy - for example when user accesses illicit material, plays games outside specified time limit or spends more than 2 hours on IRC, MicroManager can warn that it is against the usage policy, alert system administrator or turn the workstation off and lock the login account if the warning is ignored.

NetLock 98
Added 2001-10-22
by Info Touch / Surfnet Kiosk Software
Netlock is a multi-faceted security program designed to prevent unauthorized access to your computer systems. The easy to use interface and multitude of built-in features make it an ideal candidate for the Cyber Café industry. If system security and revenue tracking are important to you, then Netlock is your answer.

PC Lock 98
Added 2001-10-22
by Software.pair.com
PC Lock 98 lets you take control of the security features of Windows 95/98 that are not easily implemented through Windows itself. Disable access from modifying the systems configuration. Create multiple account allowing different system users various levels of access. Ideal for computer systems in an open area with public use. Schools, libraries, churches, businesses, and even parents can control the access level granted to users. PC Lock 98 help protect your system configuration eliminating the need to continually re-configure your system to your preferences. 30-day free trial period to evaluation the full functionality of PC Lock 98 included.

Added 2001-10-22
by WP Software
PCGuard provides users with tight security for Windows 95, and although it takes away the normal Windows 95 shell in locked mode, you can be sure your users have no settings to tweak and therefore provides the most secure method to protect your computer.

WP Winsafe
Added 2001-10-22
by WP Software
WP WinSafe implements tight security allowing you to specify the programs you want to lock out and checking all drive-related executions in your computer against program validity. That way if a program has been locked out by you, WP WinSafe doesn't let it run, simple!

Added 2001-10-22
by Weitse Venema
Chrootuid is a wrapper program designed to protect hosts from network compromise. By running a daemon under the chrootuid wrapper, if the daemon results in a remote compromise, the access acquired will be severely limited. Chrootuid utilizes the chroot() mechanism to allow the daemon to run in its own, contained sand box. If an attacker gains access to a host via a chroot'ed daemon, they will only have access to a specific subset of tools and capabilities, as provided in the chroot directory set by the wrapper.

CU Sudo
Added 2001-10-22
by Todd Miller
Sudo is a utility that allows administrators to give limited access to root privileges to users, and log activity associated with the use of sudo. This allows for giving people the access they need, without the need to give full root access.

Secure-Linux Patch
Added 2001-10-22
by Solar Designer
The Secure-Linux patch adds a few security features to the kernel which, while not a complete method of protection, will stop most of the 'cookbook' buffer overflow exploits cold. It also adds the option of restricting the use of symlinks in +t (temp) directories which fixes most tmp-race exploits as well. It can also add a little bit more privacy to the system by restricting access to parts of /proc to root so that users may not see who else is logged on or what they're doing.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus