(Page 8 of 8)   < Prev  3 4 5 6 7 8 

Category: Utilities » Email

MailSweeper
Added 2001-10-22
by Meliksah Ozoral
MailSweeper designed to delete unwanted mails according to their same characteristic such as size, subject, sender.

HLS Email Kit
Added 2001-10-22
by Vlad Lebedensky, hacktivism@mail.ru
A very fast email faker/bomber with a lot of features. Allows customization of the outgoing emails parameters right down to the date they appear to have been sent on.

Secret Agent
Added 2001-10-22
by Robert Bihlmeyer, robbe@orcus.priv.at
Secret Agent keeps passphrases and passwords in memory for a configurable timespan. Various applications can be made to cooperate with the agent; support for PGP 2 and GnuPG is provided out of the box.

MailScan
Added 2001-10-22
by Andy Kruger, andy@preciseic.com
MailScan is an email scanner that plugs into Sendmail. All messages are passed into MailScan for scanning/filtering/optional-virus-scanning before being delivered or quarantined.

EmailScan
Added 2001-10-22
by Mat,
Yet another e-mail scanner, emailscan monitors in coming mutlipart mail messages and checks for file type, file names, and virus scan. It also works both using procmail for local deliver and can be invoked when mail is relayed.

Vorpal Mail
Added 2001-10-22
by Blane Bramble
Vorpal Mail is an easily configurable but flexible replacement for sendmail, supporting advanced features such as virus scanning, virtual domains, etc.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus