|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FIRST <<< | PREV < | Showing items 346 to 360 | > NEXT | >>> LAST |
| SW Name | Home page | Downloaded |
|---|---|---|
| Recon | http://brandxdev.net/ | 2295x |
| Recon is an SSL audit tool, checking for common, certificate-related errors in SSL-enabled services. Provide it a list of SSL services for which you are responsible, run it periodically, and Recon will warn you of impending certificate expirations, mismatched certificate names, and unavailable services. | ||
|
|
Wolverine Firewall | http://webworxmedia.com/Wolverine/ | 2293x |
| Wolverine Firewall, for the easy configuration of IPTables. | ||
|
|
AESCrypt | http://aescrypt.sourceforge.net/ | 2290x |
| Small stream encryption program for Unix | ||
|
|
HTun | http://htun.runslinux.net/ | 2290x |
| HTun is a tool to allow you to create a fully bidirectional IP VPN over an HTTP proxy or just over port 80, allowing you to bypass restrictive firewalls and use any service you desire. HTun creates an point-to-point virtual IP network over HTTP by encapsulating IP traffic into valid HTTP requests. The HTun server runs on a host with an unrestricted Internet connection. It listens on a common webserver port (80 or 443) and accepts HTun client connections. The HTun client daemon runs from within a restrictive network environment, communicating with the HTun server over an HTTP proxy. | ||
|
|
Bait and Switch Honeypot System | http://baitnswitch.sourceforge.net/ | 2287x |
| The Bait and Switch Honeypot System combines the snort Intrusion Detection System (IDS) with honeypot technology to create a system that reacts to hostile intrusion attempts by marking and then redirecting all "bad" traffic to a honeypot that partially mirrors your production system. | ||
|
|
md5mon | http://www.geocities.com/[..]1/md5mon.html | 2284x |
| It checks that certain system files have not been modified and it uses "md5sum" to compute checksums of files, reporting any differences from previously recorded checksums. Optionally, a somewhat more secure, but slower, "shasum" can be used instead of "md5sum". | ||
|
|
Firepass | http://gray-world.net/[..]irepass.shtml | 2284x |
| Firepass is a tunneling tool allowing users bypass firewall restrictions and encapsulate data flows inside legal ones that use HTTP POST requests. TCP or UDP based protocols may be tunneled with Firepass. | ||
|
|
Lutz | http://www.codewear.org/[..]s.php?id=lutz | 2284x |
| Lutz is a fast and small port scanner, similar to nmap. It has the most popular scanning options (SYN, FIN, XMAS Scan, PROTO Scan, etc.) and simple OS detection. | ||
|
|
KWoodhammer | http://kwoodhammer.sourceforge.net/ | 2280x |
| KWoodhammer is the all-in-one solution for traditional encryption methods as you know from Enigma, the Pope or the Russian Secret Service (KGB). | ||
|
|
Fwctl | http://indev.insu.com/Fwctl/ | 2279x |
| Fwctl is a program that intends to make it easier to configure a tight firewall. It provides a configuration syntax that is easier to use and more expressive than the low-level primitives offered by ipchains. | ||
|
|
Secure back door | http://sbd.sourceforge.net/ | 2278x |
| Secure Back Door (SBD) is a tool that provides ultra-secure and minimal access to a computer, which allows you to run a single command based on a one time key. | ||
|
|
Stunnel | http://www.stunnel.org/ | 2278x |
| Stunnel is a program that allows you to encrypt arbitrary TCP connections inside SSL (Secure Sockets Layer) available on both Unix and Windows. Stunnel can allow you to secure non-SSL aware daemons and protocols (like POP, IMAP, LDAP, etc) by having Stunnel provide the encryption, requiring no changes to the daemon's code. | ||
|
|
Yin Yang | http://yinyang.sourceforge.net/ | 2277x |
| Yin Yang is a real-time Linux file scanner that is activated whenever a file is accessed. When a file opening system call is detected, it will send the full pathname of the file to a network daemon. The network daemon will then pass the pathname of the file to a file scanner, such as an anti-virus scanner, and return the status. | ||
|
|
fwall | http://linux.fan.lt/fwall/ | 2275x |
| fwall is a user-friendly, highly secure firewall script for iptables. It is based on bash. It includes a configuration for 1-2 interfaces, routing, port forwarding, DoS protection, ICMP and sysctl configuration and so on. | ||
|
|
Impost | http://impost.sourceforge.net/ | 2275x |
| Impost is a network security auditing tool designed to analyze the forensics behind compromised and/or vulnerable daemons. There are two different kinds of operating modes; it can either act as a honey pot and take orders from a Perl script controlling how it responds and communicates with connecting clients, or it can operate as a packet sniffer and monitor incoming data to specified destination port. | ||
|
|
||
| FIRST <<< | PREV < | Showing items 346 to 360 | > NEXT | >>> LAST |
| 1. |
Pacman linux Download: 5926x |
| 2. |
FreeBSD Download: 10133x |
| 3. |
PCLinuxOS-2010 Download: 9618x |
| 4. |
alcolix Download: 12255x |
| 5. |
Onebase Linux Download: 11020x |
| 6. |
Novell Linux Desktop Download: 0x |
| 7. |
KateOS Download: 7370x |
| 1. |
xinetd Download: 3612x |
| 2. |
RDGS Download: 937x |
| 3. |
spkg Download: 6658x |
| 4. |
LinPacker Download: 11903x |
| 5. |
VFU File Manager Download: 4056x |
| 6. |
LeftHand Mała Księgowość Download: 8438x |
| 7. |
MISU pyFotoResize Download: 3790x |
| 8. |
Lefthand CRM Download: 4602x |
| 9. |
MetadataExtractor Download: 0x |
| 10. |
RCP100 Download: 4166x |
| 11. |
Predaj softveru Download: 0x |
| 12. |
MSH Free Autoresponder Download: 0x |
linuxsoft.cz
| Design: www.megadesign.cz