(Page 10 of 16)   < Prev  5 6 7 8 9 10 11 12 13 14 15  Next >

Category: Utilities » System

Electric Death Ferret
Added 2001-10-22
by Serge Egelman, serge@guanotronic.com
Electric Death Ferret is a PHP3 script for entering new domains and virtual hosts online so that they can be setup automagically by the included Perl daemon in both Apache, NcFTPd, and BIND. This also includes setup for suexec and also includes another PHP3 script for setting up system users. These system accounts are for dialup customers and mail-only accounts. There is also an option for creating aliases in Sendmail and for converting a full dialup account into a mail-only one (this is done by editing the RADIUS file).

Added 2001-10-22
by Ward van Wanrooij
IE stores the visited URLs in some hidden files and when you clean your cache and history, this information is not deleted! I wrote a software program to scan these hidden files for URLs and to put those URLs in a file. So the user's privacy is at stake because anyone with this program, can go to the PC of somebody else and see the URLs he has visited! This program also will clear those URLs from the hidden lists

Added 2001-10-22
by Kirby Kuehl
Winterrogate recurses directory structure obtaining the following information according to filemask: File Name, Complete Path, Directory, File Size, Creation Time, Last Access Time, Last Write Time, File Attributes and MD5 Checksum. Extra information Gathered on *.DLL, *.VBX, *.DRV, *.EXE, *.OCX, *.BIN, *.SCR (IF THE DEVELOPER ADDED IT) includes CompanyName, FileDescription, FileVersion, InternalName, LegalCopyright, OriginalFilename, ProductName, ProductVersion, Comments, LegalTrademarks, PrivateBuild, and SpecialBuild. String Searches are optional. Output to .CSV format. Sample Microsoft Access 2000 database included.

HEXtreme Hex Editor for Windows
Added 2001-10-22
by Mikersoft
Powerful Color Coded Hex Editor for Windows. Customize your own color coding by setting byte or byte range colors to make files more readable to you. Easy to use multiple document interface with modern look & feel. Quickly and easily edit files up to 4 gigabytes in size with no worry of running out of memory. Lightning fast searches on even the largest of files. Search a file for a hex string, common ASCII string, or even for Unicode strings.

Code Red II Removal Utility
Added 2001-10-22
by Felipe Moniz, stealthdev@yahoo.com
Code Red II Detection and Removal Utility for IIS 5.0.

Added 2001-10-22
by michel@sgi.com
SocketWatcher is an SGI utility similar to lsof.

Added 2001-10-22
by User Datagram Protocol
Tool for listing contents of the syscall table on a running Solaris kernel. Has various 'black' and 'white' uses, but being able to check if a syscall function is residing somewhere other than you'd expect from 'nm -x /dev/ksyms' output could be useful when gathering forensics on a compromised machine.

Added 2001-10-22
by Moritz Bartl
Uses public proxies to create artificial banner ad clicks. Emulates complete browser HTTP transfer and can be used for banner/link exchanges and toplists as well.

Stealth Activity Reporter
Added 2001-10-22
by Peter Zierl
Do you want to know what is going on on your PC while you are absent? Stealth Activity Reporter (STAR) is the solution. STAR is a easy to use tool to monitor the use/abuse of PCs: It logs keystrokes, user name, passwords, visited URLS, path names, access times and windows title of the active application. The information is stored in an encrypted text file. In the stealth mode STAR does NOT show up in the system tray, task bar or task list! You can also invisibly email your log file via SMTP/POP3 email accounts. The logging engine itself is a powerful small application that runs invisibly in the background, and you will not notice at all that this application runs on your PC.

RASLock Millennium Edition
Added 2001-10-22
by SmartLine, Inc.
RASLock Millennium Edition is a client/server tool that enables to set user-level security for the Internet Dial-Up (RAS) connections. Using RASLock Me you can limit incoming and outgoing traffic, limit time online and set allowed/denied time periods for any user on a Windows 95/98/Me. It enhances the standard Windows security by allowing you to control the Internet access via modems (standard, ISDN, etc.).

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus