(Page 7 of 22)   < Prev  2 3 4 5 6 7 8 9 10 11 12  Next >

Platform: NetBSD

Added 2003-11-12
by Andrey Simonenko
IPA allows one to perform IP accounting based on FreeBSD IPv4/v6 Firewall, OpenBSD Packet Filter, and IP Filter accounting rules on Free/Net/OpenBSD. It supports limits for accounting rules, and limits events such as "limit is reached" and "reached limit is expired." It also has a flexible configuration file with many sections and options.

Added 2003-11-06
by Renaud Deraison
Nessus is a remote security scanner for Linux, BSD, Solaris, and other Unices. It is multi-threaded and plug-in-based, has a GTK interface, and performs over 500 remote security checks. It allows for reports to be generated in HTML, XML, LaTeX, and ASCII text, and suggests solutions for security problems.

Added 2003-10-22
by Kirby Kuehl
Pixilate is a packet generation tool based off of Libnet 1.1.0 (Older Libnet 1.0.x versions will not work). Pixilate generates packets by parsing a file that contains ACLs in either Cisco IOS format (using the -r option) or in Cisco PIX 6.2x format. Currently TCP, UDP, IGMP, and various types of ICMP packets are built with the appropriate source and destination for each rule. "any" as a source generates a random source address and "any" as a destination will send the packet to the user supplied destination (-d option). For more information, see the pixilate manpage.

Added 2003-10-20
by Carson Harding
Autossh is a program to monitor and automatically reestablish SSH connections. It is similar to rstunnel (Reliable SSH Tunnel), however, it is implemented in C, and is easier to set up and use, especially for connections to multiple hosts. Autossh has been compiled and tested on OpenBSD, Linux, and Solaris, and should run without needing changes on FreeBSD and NetBSD.

Webmin Usermonitor
Added 2003-10-17
by Alexander Gehrig
Webmin Usermonitor is a Webmin module that allows you to view all user connections to the system which are based on Telnet, SSH, or Samba. It is able to kill a user's connection or send a message to the user.

Added 2003-10-15
by Stefan Hetzl
Steghide is steganography program which hides bits of a data file in some of the least significant bits of another file in such a way that the existence of the data file is not visible and cannot be proven. Steghide is designed to be portable and configurable and features hiding data in bmp, wav and au files, blowfish encryption, MD5 hashing of passphrases to blowfish keys, and pseudo-random distribution of hidden bits in the container data.

Added 2003-09-29
by Sleepy
ACID XML is a stand alone application that can read and parse snort xml logs. It was inspired by ACID, but was designed so you can get up and running quickly with your logs rather than spending hours getting ACID requirments together and working.it uses QT and expat and it is fully open source.

Added 2003-08-29
by Geekoid
Email sends email to remote SMTP servers via the command line, which makes it useful in cron jobs. It will send to any RFC standard remote ESMTP server, and will allow you to encrypt, sign, and design your message on the fly. It has the capability to use signature files with dynamic options, address book functionality, and users can also attach pictures, binary files, documents, or whatever they want. It is completely compatible with GNUPG for encryption and signing, and is easy to configure and use.

The GNU Privacy Guard
Added 2003-08-26
by Werner Koch
GnuPG (the GNU Privacy Guard) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

Added 2003-06-24
by hbo
Sudoscript is a pair of Perl scripts (sudoscriptd/sudoshell) that provide an audited root shell using sudo.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus