(Page 9 of 24)   < Prev  4 5 6 7 8 9 10 11 12 13 14  Next >

Category: Utilities » Network

SILC (Secure Internet Live Conferencing)(Toolkit)
Added 2004-03-02
by Priikone
SILC (Secure Internet Live Conferencing) is a protocol which provides secure conferencing services in the Internet over insecure channels. SILC superficially resembles IRC, although they are very different internally. The purpose of SILC is to provide secure conferencing services. Strong cryptographic methods are used to secure all traffic. The SILC is delivered as SILC Client for end users, SILC Server for system administrators, and SILC Toolkit for application developers.

Just For Fun Network Management System
Added 2004-02-24
by Javier Szyszlican
Just For Fun Network Management System features an integrated syslog, Tacacs, TFTP configuration download, SNMP polling, SNMP traps, journal, autodiscovery, performance graphs (RRD), SLAs, and a lot more. Everything uses a database MySQL/PostgreSQL) backend. It works in Linux and Windows.

Added 2004-02-16
by Claudio Clemens
Sambascan2 allows you to search an entire network or a number of hosts for SMB shares. It will also list the contents of all public shares that it finds. The difference between sambascan2 and other SMB viewers and scanners is that it will search everything using TCP/IP, and it will not send a lot of broadcast messages, so it can be used over LAN boundaries. It only uses SMB to list the shares and their contents.

Added 2004-02-16
by Alexander V. Konstantinou
NetCallback is a Java application permitting the export of TCP and UDP ports behind a firewall to hosts outside the firewall. This may be useful in some special cases, for example, centralized control of test (demo) networks, or connection to applets running in browsers. NetCallback consists of a public and a private server. The public server executes on a host outside the firewall and is responsible for receiving port forwarding requests. The private server is run on a host behind the firewall and is responsible for contacting the public server and connecting the protected TCP and/or UDP service to the public server clients. The connection between public and private servers may optionally be encrypted using SSL.

AIM Sniff
Added 2004-02-12
by Shawn Grimes
AIM Sniff is a utility for monitoring and archiving AOL Instant Messenger messages across a network. It can be used to monitor for cases of harassment or warez trading. It has the ability to do a live dump (actively sniff the network) or read a PCAP file and parse the file for IM messages. You also have the option of dumping the information to a MySQL database or STDOUT. AIM Sniff will also monitor for an AIM login and then perform an SMB lookup on the originating computer in order to match NT Domain names with AIM login names (handles). A very basic Web frontend is included.

Added 2004-01-26
by tascon
Brcontrol is a set of patches to allow some interaction between an IDS and a firewall. Currently, snort is supported as an IDS, and the netfilter facility of Linux is supported as a firewall. Brcontrol can help in the creation of aggresive honeypots or other advanced firewall and IDS configurations. It can also work as a bridge.

Added 2004-01-12
by Darren Bounds
Packit is a network auditing tool that allows you to monitor, manipulate, and inject customized IPv4 traffic into your network. This can be extremely valuable for testing firewalls, intrusion detection systems, port scanning, and general TCP/IP auditing. It currently supports the ability to define nearly all TCP, UDP, ICMP, IP, and Ethernet header options. It requires libnet 1.1 or greater as well as libpcap, and has been tested to run on FreeBSD, NetBSD, OpenBSD, and Linux.

Added 2004-01-06
by Michael Buesch
CalcChecksum is a simple utility for calculating various checksums easily with a graphical user interface.

Added 2003-12-24
by David DeLauro
Pacemaker is a dynamic rate-limiting script that watches network traffic and determines which machines are probably abusing your network. Pacemaker catches things like Windows worm scans, port scans, P2P network traffic, and anything else that tries to go beyond the normal number of connections a standard machine should use. The machine needs to abuse the network for two minutes before pacemaker will mark the IP address to be rate-limited. A machine will stay marked for as many minutes as it has abused the network.

Added 2003-12-24
by embyte
Gspoof is a GTK+ program written in C language which makes easier and accurate the building and the sending of TCP packets with a data-payload or not. It's possible to modify TCP/IP fields and also ethernet header working to Link Level. You can send one or more packets together.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus