|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FIRST <<< | PREV < | Showing items 166 to 180 | > NEXT | >>> LAST |
| SW Name | Home page | Downloaded |
|---|---|---|
| IPFC | http://www.conostix.com/ipfc/ | 2017x |
| IPFC is a software and framework to manage and monitor multiple types of security modules across a global network. | ||
|
|
GnuPG.pm | http://indev.insu.com/GnuPG/ | 2012x |
| The GnuPG perl module interfaces with the Gnu Privacy Guard using the coprocess hooks provided by gpg. | ||
|
|
Makejail | http://www.floc.net/makejail/ | 2012x |
| Makejail employs short configuration files to help administrators create and maintain chroot jails. | ||
|
|
ip-masq-log | http://www.cli.di.unipi.it/[..]zunino/linux/ | 2010x |
| This patch can be used on a masquerading firewall (NAT) to keep a log of all the outgoing masqueraded TCP connections. | ||
|
|
pam_ccreds | http://www.padl.com/[..]m_ccreds.html | 2010x |
| The pam_ccreds module provides the means for Linux workstations to locally authenticate using an enterprise identity when the network is unavailable. | ||
|
|
squidefender | http://www.jeroen.se/[..]idefender.php | 2007x |
| Squidefender is a perl script which parses a squid log file in native format for attacks. | ||
|
|
LinVPN | http://mrtg.planetmirror.com/pub/linvpn/ | 2005x |
| LinVPN allows you to create a VPN (Virtual Private Network) from linux to linux. Normally both are gateways of a LAN, then the LANs behind them may access each other over an encrypted tunnel created by the software. | ||
|
|
fcatalog | http://fcatalog.lupine.org/ | 2003x |
| fcatalog is a program for identifying the origins of files. Though its operation is similar to the operation of file-checksum-checking security utilities (like tripwire), its purpose and methodology is different. | ||
|
|
Keychain | http://www.gentoo.org/[..]ain/index.xml | 2001x |
| The keychain script makes handling RSA and DSA keys both convenient and secure. | ||
|
|
TEA Total | http://www.linuxhacker.org/tea-total/ | 1997x |
| TEA Total is a very small 128 bit private key based encryption/decryption system which uses the block variant of TEA (Tiny Encryption Algorithm) | ||
|
|
authd_ | http://69.56.132.179/~ury/ | 1994x |
| authd_ is an auth daemon for Linux. It operates without using the SUID bit on executables, and it supports the PAM and NSS interfaces, /etc/passwd, /etc/shadow, and MySQL for storing user information. | ||
|
|
chkrootkit | http://www.chkrootkit.org/ | 1992x |
| chkrootkit is a tool to locally check for signs of a rootkit. It contains a chkrootkit: shell script that checks system binaries for rootkit modification. The following tests are made: aliens, asp, bindshell, lkm, rexedcs, sniffer, wted, z2, amd, basename, biff, chfn, chsh, cron, date, du, dirname, echo, egrep, env, find, fingerd, gpm, grep, hdparm, su, ifconfig, inetd, inetdconf, identd, killall, login, ls, mail, mingetty, netstat, named, passwd, pidof, pop2, pop3, ps, pstree, rpcinfo, rlogind, rshd, slogin, sendmail, sshd, syslogd, tar, tcpd, top, telnetd, timed, traceroute, and write. | ||
|
|
Tunnel Vision | http://open.nit.ca/[..]=TunnelVision | 1992x |
| TunnelVision creates an encrypted VirtualPrivateNetwork, or VPN, between two Tunnel Vision-capable sites on the Internet. | ||
|
|
Horatio: Authenticated Network Access | http://www.cs.utexas.edu/[..]ware/horatio/ | 1992x |
| The Horatio system is a firewall authentication tool. The premise: legitimate users want to attach laptops and other mobile hosts to the network, but security demands that illegitimate users be prevented from accessing the internal, secure network and from abusing the general Internet. The approach taken by Horatio is to provide a separate, untrusted network that only connects to the internal network (and thus to the Internet) through a firewall that by default does not pass any traffic. The user must point a Web browser at the Horatio web server, which runs on the firewall machine, and provide a username and password. | ||
|
|
fe3d | http://projects.icapsid.net/fe3d/ | 1991x |
| fe3d is a 3D visualization tool for network (security) information. It has support for nmap and (limited) support for languard XML log files. | ||
|
|
||
| FIRST <<< | PREV < | Showing items 166 to 180 | > NEXT | >>> LAST |
| 1. |
Pacman linux Download: 5874x |
| 2. |
FreeBSD Download: 10095x |
| 3. |
PCLinuxOS-2010 Download: 9581x |
| 4. |
alcolix Download: 12195x |
| 5. |
Onebase Linux Download: 10942x |
| 6. |
Novell Linux Desktop Download: 0x |
| 7. |
KateOS Download: 7322x |
| 1. |
xinetd Download: 3527x |
| 2. |
RDGS Download: 937x |
| 3. |
spkg Download: 6563x |
| 4. |
LinPacker Download: 11802x |
| 5. |
VFU File Manager Download: 4020x |
| 6. |
LeftHand Mała Księgowość Download: 8394x |
| 7. |
MISU pyFotoResize Download: 3747x |
| 8. |
Lefthand CRM Download: 4568x |
| 9. |
MetadataExtractor Download: 0x |
| 10. |
RCP100 Download: 4119x |
| 11. |
Predaj softveru Download: 0x |
| 12. |
MSH Free Autoresponder Download: 0x |
linuxsoft.cz
| Design: www.megadesign.cz