|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FIRST <<< | PREV < | Showing items 346 to 360 | > NEXT | >>> LAST |
| SW Name | Home page | Downloaded |
|---|---|---|
| Lutz | http://www.codewear.org/[..]s.php?id=lutz | 2251x |
| Lutz is a fast and small port scanner, similar to nmap. It has the most popular scanning options (SYN, FIN, XMAS Scan, PROTO Scan, etc.) and simple OS detection. | ||
|
|
AESCrypt | http://aescrypt.sourceforge.net/ | 2250x |
| Small stream encryption program for Unix | ||
|
|
cryptoswap | http://www.flyn.org/[..]ap/index.html | 2244x |
| The cryptoswap package supports building an encrypted swap partition when a system boots. This may be necessary on systems that use encrypted filesystems because plaintext secrets may be written to disk when memory is swapped to disk. | ||
|
|
Yin Yang | http://yinyang.sourceforge.net/ | 2243x |
| Yin Yang is a real-time Linux file scanner that is activated whenever a file is accessed. When a file opening system call is detected, it will send the full pathname of the file to a network daemon. The network daemon will then pass the pathname of the file to a file scanner, such as an anti-virus scanner, and return the status. | ||
|
|
OutGuess | http://www.outguess.org/ | 2243x |
| A universal steganographic tool that allows the insertion of hidden information into the redundant bits of data sources. | ||
|
|
Secure back door | http://sbd.sourceforge.net/ | 2243x |
| Secure Back Door (SBD) is a tool that provides ultra-secure and minimal access to a computer, which allows you to run a single command based on a one time key. | ||
|
|
Wolverine Firewall | http://webworxmedia.com/Wolverine/ | 2240x |
| Wolverine Firewall, for the easy configuration of IPTables. | ||
|
|
Fwctl | http://indev.insu.com/Fwctl/ | 2240x |
| Fwctl is a program that intends to make it easier to configure a tight firewall. It provides a configuration syntax that is easier to use and more expressive than the low-level primitives offered by ipchains. | ||
|
|
Return-RST | http://www.bellamy.co.nz/[..]section5.html | 2237x |
| Return-RST is a firewalling tool for Linux 2.2.xx systems using IPCHAINS. It uses the netlink device to capture packets and sends TCP RST packets in response to TCP connection requests. | ||
|
|
fwall | http://linux.fan.lt/fwall/ | 2237x |
| fwall is a user-friendly, highly secure firewall script for iptables. It is based on bash. It includes a configuration for 1-2 interfaces, routing, port forwarding, DoS protection, ICMP and sysctl configuration and so on. | ||
|
|
Impost | http://impost.sourceforge.net/ | 2235x |
| Impost is a network security auditing tool designed to analyze the forensics behind compromised and/or vulnerable daemons. There are two different kinds of operating modes; it can either act as a honey pot and take orders from a Perl script controlling how it responds and communicates with connecting clients, or it can operate as a packet sniffer and monitor incoming data to specified destination port. | ||
|
|
Stunnel | http://www.stunnel.org/ | 2234x |
| Stunnel is a program that allows you to encrypt arbitrary TCP connections inside SSL (Secure Sockets Layer) available on both Unix and Windows. Stunnel can allow you to secure non-SSL aware daemons and protocols (like POP, IMAP, LDAP, etc) by having Stunnel provide the encryption, requiring no changes to the daemon's code. | ||
|
|
KWoodhammer | http://kwoodhammer.sourceforge.net/ | 2234x |
| KWoodhammer is the all-in-one solution for traditional encryption methods as you know from Enigma, the Pope or the Russian Secret Service (KGB). | ||
|
|
yersinia | http://yersinia.sourceforge.net/ | 2228x |
| Yersinia is a network tool designed to take advantage of some weakeness in different network protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. | ||
|
|
md5mon | http://www.geocities.com/[..]1/md5mon.html | 2227x |
| It checks that certain system files have not been modified and it uses "md5sum" to compute checksums of files, reporting any differences from previously recorded checksums. Optionally, a somewhat more secure, but slower, "shasum" can be used instead of "md5sum". | ||
|
|
||
| FIRST <<< | PREV < | Showing items 346 to 360 | > NEXT | >>> LAST |
| 1. |
Pacman linux Download: 5836x |
| 2. |
FreeBSD Download: 10066x |
| 3. |
PCLinuxOS-2010 Download: 9556x |
| 4. |
alcolix Download: 12153x |
| 5. |
Onebase Linux Download: 10879x |
| 6. |
Novell Linux Desktop Download: 0x |
| 7. |
KateOS Download: 7292x |
| 1. |
xinetd Download: 3482x |
| 2. |
RDGS Download: 937x |
| 3. |
spkg Download: 6490x |
| 4. |
LinPacker Download: 11735x |
| 5. |
VFU File Manager Download: 3995x |
| 6. |
LeftHand Mała Księgowość Download: 8358x |
| 7. |
MISU pyFotoResize Download: 3714x |
| 8. |
Lefthand CRM Download: 4537x |
| 9. |
MetadataExtractor Download: 0x |
| 10. |
RCP100 Download: 4084x |
| 11. |
Predaj softveru Download: 0x |
| 12. |
MSH Free Autoresponder Download: 0x |
linuxsoft.cz
| Design: www.megadesign.cz