LINUXSOFT.cz
Username: Password:     
    CZ UK PL

> Software list : : SECURITY-->other

The newest SW   Total count SW item: 217   Top download SW
FIRST <<< PREV < Showing items 196 to 210 > NEXT >>> LAST
SW Name Home page Downloaded
DNS Flood Detector http://www.adotout.com/ 2008x
DNS Flood Detector was developed to detect abusive usage levels on high traffic nameservers and to enable quick response in halting (among other things) the use of one's nameserver to facilitate spam.
 
SRP http://srp.stanford.edu/ 2007x
SRP is a secure password-based authentication and key-exchange protocol.
 
SMTarPit http://www.fresh.files2.serveftp.net/smtarpit/ 2006x
SMTarPit is a combined SMTP honeypot and tarpit released under the GPL. It is writen in Perl so it should work on virtually any platform that supports Perl (except Windows).
 
fragroute http://www.monkey.org/[..]ng/fragroute/ 2004x
fragroute intercepts, modifies, and rewrites egress traffic, implementing most of the attacks described in the Secure Networks "Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection" paper.
 
Medusa DS9 http://medusa.terminus.sk/ 2004x
Medusa DS9 is used to increase Linux's security. It consists of two major parts, Linux kernel changes and the user-space daemon.
 
leetnet http://www.leetnet.org/ 1999x
Leetnet is a dynamic network of small networks connected securely via the Internet using the IPSEC protocol. Managed by a central web interface and database, all networks can establish secure IPSEC VPN connections despite such complications as dynamic IP addresses, different IPSEC implementations, large numbers of tunnels, multiple users, and overall complexity related to IPSEC VPN use. Leetnet also serves as a central registrar for private networks, guaranteeing network uniqueness and connectivity with other Leetnet networks.
 
ISIC http://packages.debian.org/[..]/net/isic.htm 1998x
ISIC (and components) is intended to test the integrity of an IP Stack and its component stacks (TCP, UDP, ICMP et. al.) It does this by generating controlled random packets. You can use ISIC for testing if a firewall leaks packets, or how well an IDS functions.
 
DX-PKI http://www.idealx.org/prj/ 1993x
IDX-PKI is an Open Source implementation of a Public Key Infrastructure which aims to be IETF compliant for PKIX recommendations. IDX-PKI is routinely used by companies and public agencies.
 
FakeBO http://cvs.linux.hr/fakebo/ 1989x
This program fakes trojan servers and logs every attempt from client. It is possible to log attempts to file, stdout, stderr or to syslog. It can send fake pings and replies back to trojan client.
 
libjsw http://wolfpack.twu.net/libjsw/ 1984x
The UNIX Joystick Driver Wrapper Library and Calibrator (libjsw) provides the programmer with the assistance to easilly code applications that need to use the joystick driver and a convience to users by storing the calibration information in a .joystick calibration file.
 
JailTool http://www.westfalen.de/~gb/ 1982x
JailTool is a script that creates a full chroot environment out of a declarative .jail file. To accomplish this it uses available package registration databases like the dpkg database and Perl CPAN .packlist files to create lists of files to be copied.
 
SystemSearcher http://www.geektown.de/ 1977x
SystemSearcher is a Linux security scanner written in Perl. It scans single hosts or subnets for anonymous FTP servers, TFTP servers, SMTP servers which allow relaying, SSH servers, Telnet servers, NFS servers with exported directories, mail servers, Web servers (HTTP/HTTPS), well- known trojan ports, and exploitable CGIs.
 
dlogin http://davmac.org/dlogin/ 1920x
dlogin is a replacement login which allows automatically adding users who login via a virtual terminal (local terminal) to a group or list of groups temporarily. This can be used to allow such a user to shutdown the system, use the audio device, etc., even if they are not root.
 
The Coroner's Toolkit http://www.antioffline.com/TCT/ 0x
The Coroner's Toolkit (TCT) is a collection of tools designed to assist in a forensic examination of a computer. It is primarily designed for Unix systems, but it can some small amount of data collection & analysis from non-Unix disks and media.
 
SAT (Simple scAnning Tool) http://sat.berlios.de/ 0x
SAT (Simple scAnning Tool) is a simple and fast network scanner written in Python progamming language. It is used to identify network devices and services. The identification is based on recieved data such as banners.
 
FIRST <<< PREV < Showing items 196 to 210 > NEXT >>> LAST
> Search Software
> Search Google
1. Pacman linux
Download: 5955x
2. FreeBSD
Download: 10157x
3. PCLinuxOS-2010
Download: 9644x
4. alcolix
Download: 12320x
5. Onebase Linux
Download: 11080x
6. Novell Linux Desktop
Download: 0x
7. KateOS
Download: 7415x

1. xinetd
Download: 3678x
2. RDGS
Download: 937x
3. spkg
Download: 6714x
4. LinPacker
Download: 11962x
5. VFU File Manager
Download: 4088x
6. LeftHand Mała Księgowość
Download: 8475x
7. MISU pyFotoResize
Download: 3818x
8. Lefthand CRM
Download: 4626x
9. MetadataExtractor
Download: 0x
10. RCP100
Download: 4204x
11. Predaj softveru
Download: 0x
12. MSH Free Autoresponder
Download: 0x
©Pavel Kysilka - 2003-2026 | mailatlinuxsoft.cz | Design: www.megadesign.cz