LINUXSOFT.cz
Username: Password:     
    CZ UK PL

> Software list : : SECURITY-->other

The newest SW   Total count SW item: 217   Top download SW
FIRST <<< PREV < Showing items 106 to 120 > NEXT >>> LAST
SW Name Home page Downloaded
HTun http://htun.runslinux.net/ 2277x
HTun is a tool to allow you to create a fully bidirectional IP VPN over an HTTP proxy or just over port 80, allowing you to bypass restrictive firewalls and use any service you desire. HTun creates an point-to-point virtual IP network over HTTP by encapsulating IP traffic into valid HTTP requests. The HTun server runs on a host with an unrestricted Internet connection. It listens on a common webserver port (80 or 443) and accepts HTun client connections. The HTun client daemon runs from within a restrictive network environment, communicating with the HTun server over an HTTP proxy.
 
Bait and Switch Honeypot System http://baitnswitch.sourceforge.net/ 2275x
The Bait and Switch Honeypot System combines the snort Intrusion Detection System (IDS) with honeypot technology to create a system that reacts to hostile intrusion attempts by marking and then redirecting all "bad" traffic to a honeypot that partially mirrors your production system.
 
AESCrypt http://aescrypt.sourceforge.net/ 2274x
Small stream encryption program for Unix
 
Lutz http://www.codewear.org/[..]s.php?id=lutz 2272x
Lutz is a fast and small port scanner, similar to nmap. It has the most popular scanning options (SYN, FIN, XMAS Scan, PROTO Scan, etc.) and simple OS detection.
 
Secure back door http://sbd.sourceforge.net/ 2263x
Secure Back Door (SBD) is a tool that provides ultra-secure and minimal access to a computer, which allows you to run a single command based on a one time key.
 
Impost http://impost.sourceforge.net/ 2262x
Impost is a network security auditing tool designed to analyze the forensics behind compromised and/or vulnerable daemons. There are two different kinds of operating modes; it can either act as a honey pot and take orders from a Perl script controlling how it responds and communicates with connecting clients, or it can operate as a packet sniffer and monitor incoming data to specified destination port.
 
Yin Yang http://yinyang.sourceforge.net/ 2262x
Yin Yang is a real-time Linux file scanner that is activated whenever a file is accessed. When a file opening system call is detected, it will send the full pathname of the file to a network daemon. The network daemon will then pass the pathname of the file to a file scanner, such as an anti-virus scanner, and return the status.
 
md5mon http://www.geocities.com/[..]1/md5mon.html 2259x
It checks that certain system files have not been modified and it uses "md5sum" to compute checksums of files, reporting any differences from previously recorded checksums. Optionally, a somewhat more secure, but slower, "shasum" can be used instead of "md5sum".
 
Stunnel http://www.stunnel.org/ 2259x
Stunnel is a program that allows you to encrypt arbitrary TCP connections inside SSL (Secure Sockets Layer) available on both Unix and Windows. Stunnel can allow you to secure non-SSL aware daemons and protocols (like POP, IMAP, LDAP, etc) by having Stunnel provide the encryption, requiring no changes to the daemon's code.
 
KWoodhammer http://kwoodhammer.sourceforge.net/ 2257x
KWoodhammer is the all-in-one solution for traditional encryption methods as you know from Enigma, the Pope or the Russian Secret Service (KGB).
 
yersinia http://yersinia.sourceforge.net/ 2255x
Yersinia is a network tool designed to take advantage of some weakeness in different network protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems.
 
Panoptis http://sourceforge.net/[..]ects/panoptis 2247x
Panoptis plans to create a network security tool (N-IDS) to detect and block DoS and DDoS attacks. The programming language is C++, and the input is being provided by routers.
 
fEncH http://serbianc.sourceforge.net/[..]rojects/fEncH 2245x
This is a fast and simple, yet hard to crack encryption program. It uses XOR encryption with variable key, based on the password that user inputs to the program, it rumbles bits in the bytes, etc.
 
GNU Privacy Assistant http://www.gnupg.org/[..]software/gpa/ 2243x
The GNU Privacy Assistant (GPA) is a graphical user interface for the GnuPG (GNU Privacy Guard).
 
Ciphire Mail http://www.ciphire.com/ 2239x
Ciphire Mail is an email encryption tool. It works in conjunction with your existing email client.
 
FIRST <<< PREV < Showing items 106 to 120 > NEXT >>> LAST
> Search Software
> Search Google
1. Pacman linux
Download: 5893x
2. FreeBSD
Download: 10111x
3. PCLinuxOS-2010
Download: 9594x
4. alcolix
Download: 12220x
5. Onebase Linux
Download: 10978x
6. Novell Linux Desktop
Download: 0x
7. KateOS
Download: 7337x

1. xinetd
Download: 3555x
2. RDGS
Download: 937x
3. spkg
Download: 6609x
4. LinPacker
Download: 11836x
5. VFU File Manager
Download: 4040x
6. LeftHand Mała Księgowość
Download: 8415x
7. MISU pyFotoResize
Download: 3766x
8. Lefthand CRM
Download: 4581x
9. MetadataExtractor
Download: 0x
10. RCP100
Download: 4142x
11. Predaj softveru
Download: 0x
12. MSH Free Autoresponder
Download: 0x
©Pavel Kysilka - 2003-2026 | mailatlinuxsoft.cz | Design: www.megadesign.cz