(Page 8 of 50)   < Prev  3 4 5 6 7 8 9 10 11 12 13  Next >

Category: Access Control

Added 2005-02-09
by GemiScorp Software Solutions
SafeLogon is a multi-user and password-based access control utility that enhances and complements the Windows built-in logon and authentication system. In other words, SafeLogon allows you to protect your system at home and office from unauthorized access. SafeLogon is fully configurable and allows its Administrator to: - Restrict access to Windows to certain users, optionally controlling the days of the week and the time of the day the user is allowed to log on and

Added 2005-02-09
by GemiScorp Software Solutions
SafeSystem is a security program that allows you to prevent access to your personal and important files and folders, as well as protect and guarantee the integrity and well functioning of your system. SafeSystem can make your files and folders completely invisible, inaccessible or simply read-only. Furthermore, SafeSystem can prevent the change of configuration and the accidental (or even intentional) system files deletion or alteration, so your PC will be healthy

Added 2005-01-17
by Tomas Junnonen
Firestarter is graphical firewall tool for Linux. The program aims to combine ease of use with powerful features, serving both desktop users and administrators.

Added 2005-01-14
by Hernán M. Racciatti
IPFront is a small tool named which enables users to generate IPSec rules easily. It really speeds-up the process of hardening Windows 2000/2003 in Bastion Host Environment. Additionally, it allows to set-up IPSec exceptions, and enables a couple of TCP/IP Stack protections against DoSes. So, IPFront is nothing more than a small Frontend/GUI that writes small scripts that one can later execute from within IPFront, or externally, as simple script files, in other servers,

ROPE for IpTables
Added 2005-01-14
by Chris Lowth
ROPE allows IpTables to block P2P and other complex protocols accurately. It is a highly flexible iptables module that allows complex protocols (such as are used by P2P software) to be identified. It is an in-kernel scripting language designed for IP packet matching. A growing number of sample configurations (scripts) are provided, including: blocking Gnutella and Bittorrent clients, blocking large web downloads - etc. Plenty more to come. ROPE is part of the P2PWall

Added 2004-12-08
by James Meehan
pasmal 1.5 is a port knocking authentification system using simple or encrypted tcp/udp/icmp packets. pasmal can be used with iptables/ipchains (firewall purposes) or any other program (remote shell, reboot, etc)It is packaged with a php web admin, a command line client pasmal.client, start/stop rc.d scripts.pasmal 1.5 also feature an intrusion/attempts detection system due to its sniffers capabilities, running with syslogd and custom log files.

Added 2004-11-12
by Gerhard Lausser
Rootsh is a wrapper for shells which logs all echoed keystrokes and terminal output to a file and/or to syslog. It's main purpose is the auditing of users who need a shell with root privileges. They start rootsh through the sudo mechanism. I's in heavy use here at a big bavarian car manufacturer (three letters, fast, cool,...) for project users whom you can't deny root privileges.

BullDog Firewall
Added 2004-10-27
by Robert APM Darin
Bulldog is a powerful but lightweight firewall for heavy use systems. With many features, this firewall can be used by anyone who wants to protect his/her systems. This system allow dynamic and static rules sets for maximum protection and has several advance features. This firewall will work for the hobbyist or a military base. Generation 7 is a complete rewrite and redesign from scratch. Be prepared to spend some time setting this up.

Added 2004-10-21
by Malcolm Smith
The Antinat SOCKS Server is a multi-threaded, scalable SOCKS server with a client library for writing proxy-based applications. It supports SOCKS 4, SOCKS 5, authentication, firewalling, UDP, and name resolution.

Added 2004-10-13
by Arne Vidstrom
MobileJavaScanner is a TCP port scanner MIDlet (Java program for cellular phones).

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus