LINUXSOFT.cz
Username: Password:     
    CZ UK PL

> Software list : : SECURITY

The newest SW   Total count SW item: 524   Top download SW
FIRST <<< PREV < Showing items 466 to 480 > NEXT >>> LAST
SW Name Home page Downloaded
Horatio: Authenticated Network Access http://www.cs.utexas.edu/[..]ware/horatio/ 1778x
The Horatio system is a firewall authentication tool. The premise: legitimate users want to attach laptops and other mobile hosts to the network, but security demands that illegitimate users be prevented from accessing the internal, secure network and from abusing the general Internet. The approach taken by Horatio is to provide a separate, untrusted network that only connects to the internal network (and thus to the Internet) through a firewall that by default does not pass any traffic. The user must point a Web browser at the Horatio web server, which runs on the firewall machine, and provide a username and password.
 
Directory Watcher http://pedram.redhive.com/ 1778x
Directory Watcher was written to aid in the discovery of race conditions. It has multiple speed settings, the fastest of which can even catch a successive link() unlink(). It also has the ability to filter files based on user, group, suid bit, and wildcard (*?) file names.
 
THC-Dialup Login Hacker http://www.thc.org 1770x
Long, long time ago, we released a tool called Login Hacker, for penetrating dialup modems. Today we are releasing a similar and easier tool for Linux which does the same job better. All you need is UNIX and minicom. Have fun with this little release!
 
Cmb http://members.optushome.com.au/[..]software.html 1770x
Cmb is a small utility that creates all the possible combinations from a user mask (that includes wildcards) and dumps them to stdout
 
OpenSSH SecurID patch http://www.omniti.com/[..]sus/projects/ 1769x
This patch integrates SecurID authentication services directly into the OpenSSH daemon, allowing users to use SecurID tokens directly as their passwords instead of relying on the clunky sdshell.
 
SRP http://srp.stanford.edu/ 1769x
SRP is a secure password-based authentication and key-exchange protocol.
 
Tknetbus http://computer.freepage.de/linux-azubi/ 1768x
Tcl/TK-Client for the netbusserver, a trojan which allows intruders to control the computer with netbusservers running on
 
CODEX http://www.umiacs.umd.edu/[..]mmarsh/CODEX/ 1768x
CODEX is designed for applications with a moderate number of clients (tens or hundreds) requesting keys that change often but not continuously (on the scale of minutes to hours).
 
authforce http://kapheine.hypa.net/authforce/ 1767x
Authforce is an HTTP authentication brute forcer. Using various methods, it attempts brute force username and password pairs for a site.
 
ADMsmb http://www.void.irq.org/ 1764x
ADMsmb is a security scanner for Samba based on the source of smbclient. It will get the netbios name, share list, workgroup, domain, and OS.
 
squidefender http://www.jeroen.se/[..]idefender.php 1763x
Squidefender is a perl script which parses a squid log file in native format for attacks.
 
leetnet http://www.leetnet.org/ 1760x
Leetnet is a dynamic network of small networks connected securely via the Internet using the IPSEC protocol. Managed by a central web interface and database, all networks can establish secure IPSEC VPN connections despite such complications as dynamic IP addresses, different IPSEC implementations, large numbers of tunnels, multiple users, and overall complexity related to IPSEC VPN use. Leetnet also serves as a central registrar for private networks, guaranteeing network uniqueness and connectivity with other Leetnet networks.
 
Worm Warner http://www.jeroen.se/ 1760x
WormWarner is a tool designed to warn hosts that are probably infected by worms.
 
sbd http://www.cycom.se/dl/sbd 1760x
Sbd is a Netcat-clone, designed to be portable and offer strong encryption. It runs on Unix-like operating systems and on Microsoft Win32
 
ISIC http://packages.debian.org/[..]/net/isic.htm 1759x
ISIC (and components) is intended to test the integrity of an IP Stack and its component stacks (TCP, UDP, ICMP et. al.) It does this by generating controlled random packets. You can use ISIC for testing if a firewall leaks packets, or how well an IDS functions.
 
FIRST <<< PREV < Showing items 466 to 480 > NEXT >>> LAST
> Search Software
> Search Google
1. Pacman linux
Download: 5525x
2. FreeBSD
Download: 9740x
3. PCLinuxOS-2010
Download: 9230x
4. alcolix
Download: 11702x
5. Onebase Linux
Download: 10392x
6. Novell Linux Desktop
Download: 0x
7. KateOS
Download: 6890x

1. xinetd
Download: 3028x
2. RDGS
Download: 937x
3. spkg
Download: 5931x
4. LinPacker
Download: 11110x
5. VFU File Manager
Download: 3742x
6. LeftHand Mała Księgowość
Download: 7973x
7. MISU pyFotoResize
Download: 3452x
8. Lefthand CRM
Download: 4233x
9. MetadataExtractor
Download: 0x
10. RCP100
Download: 3748x
11. Predaj softveru
Download: 0x
12. MSH Free Autoresponder
Download: 0x
©Pavel Kysilka - 2003-2025 | mailatlinuxsoft.cz | Design: www.megadesign.cz