(Page 10 of 27)   < Prev  5 6 7 8 9 10 11 12 13 14 15  Next >

Category: Access Control » Firewall

PCX Firewall
Added 2002-10-30
by James A. Pattie
PCX Firewall is an IPTables firewalling solution that uses Perl to generate static shell scripts based upon the user's configuration settings. This allows the firewall to startup quickly, as it does not have to parse config files every time it starts.

Remote packet filter control daemon
Added 2002-10-24
by haver
rpfcd (Remote packet filter control daemon) allows remote control and monitoring of OpenBSD's packet filter. It communicates with clients using the RPFC protocol running on top of SSL. The protocol is designed to be relatively forgiving and easy to use. Its goal is to provide a common framework for pf control and monitoring. Instead of running pfctl/tcpdump/pflogd, writing ad-hoc parsing scripts, and sending the results by mail, rpfcd will provide the same and much more via a transparent server-client interface. Together with a decent CLI/GUI client, pf firewall monitoring becomes rather easy. This is especially interesting if you have several pf firewalls to control and monitor.

Added 2002-09-30
by Asher
IPShutter listens for connections on one port, and upon proper authentication temporarily unlocks a second port. The unlocking is brief (by default two minutes) and only applies to the IP address from which the authentication occurred. It is useful for restricting access to sshd. It uses and generates one-time passwords for authentication, which is accomplished with a Web browser. Abusive or password-guessing IP addresses are subject to two levels of banning.

Added 2002-08-14
by Moshe Jacobson
HTun is a VPN (Virtual Private Network) interface that allows you to create a fully bidirectional IP-layer VPN over an HTTP proxy or just over port 80, allowing you to bypass restrictive firewalls and use any IP-based service you desire.

Added 2002-07-31
by Michael C. Toren
tcptraceroute is a traceroute implementation using TCP SYN packets, instead of the more traditional UDP or ICMP ECHO packets. In doing so, it is able to trace through many common firewall filters.

Added 2002-07-23
by Pachyderm Firewall Management Software
Pachyderm is graphical firewall management software for ipchains. It is based on MySQL and PHP, easy to use, and has lots of configuration abilities.

Added 2002-07-03
by Luis Wong
Simple Firewall is a easy tool for administration of users and access control. It uses iptables for packet filtering, and saves rules with XML. It can be run in bash and over the Web via webmin.

Added 2002-06-19
by v0.2
FireDisk is a firewall-on-a-floppy implementation using iptables. It uses C code to do the startup and spwans iptables to apply filters to the 2.4.18 kernel.

Added 2002-05-17
by Josť MANS
Mail2sh makes it possible to carry out shell commands by email. Email is sent to a particular user on your host and the commands will be carried out if the user and password given matches ones in /etc/passwd. Commands are executed with the user's privileges, and combined with a PGP module ensures a certain level of security for use. Note that the system is not natively encrypted, so use of an encryption mechanism is highly recommended for security reasons.

Firewall by Jim
Added 2002-05-15
by Jim Gifford
This is a firewall that takes advantage of tcp_wrappers information to block users. It also uses separate files for configuration ease. It is designed to work out of the box with eth0 for internet and eth1 for the LAN.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus