Nazwa oprogramowania |
Strona domowa |
Pobierane |
TkPGP |
http://packages.debian.org/[..]le/misc/tkpgp |
1831x |
TkPGP intends to completely eliminate need to access command- line interface of PGP for UNIX. Currently most of casual activity such as signing, encrypting and decrypting is done in GUI. Key management remains a domain of command line for the time being.
|
|
Rkdet |
http://vancouver-webpages.com/rkdet/ |
1826x |
Rkdet to mały demon przeznaczony do łapania ludzi instalujących rootkity lub uruchamiających sniffer pakietów.
|
|
blaim |
http://www.im-passe.com/phar/ |
1825x |
Strong crypto (2048bit diffie-hellman & 448bit blowfish..take that subspace) for gaim.
|
|
ip-masq-log |
http://www.cli.di.unipi.it/[..]zunino/linux/ |
1818x |
This patch can be used on a masquerading firewall (NAT) to keep a log of all the outgoing masqueraded TCP connections.
|
|
Makejail |
http://www.floc.net/makejail/ |
1811x |
Makejail oferuje krótkie pliki konfiguracyjne pomagające administratorom tworzyć i zarządzać środowiskami chroot jail.
|
|
authd_ |
http://69.56.132.179/~ury/ |
1810x |
authd_ to demon uwierzytelniania dla Linuksa. Działa bez korzystania z bitu SUID na plikach wykonywalnych oraz obsługuje interfejsy PAM i NSS oraz /etc/passwd, /etc/shadow i MySQL do przechowywania informacji o użytkownikach.
|
|
rccrypt |
http://www.ricksoft.co.uk/[..]t/rccrypt.htm |
1807x |
RC-Crypt keeps your data safe. It is an easy to use command line program that encrypts your data.
|
|
Shishi |
http://www.gnu.org/[..]tware/shishi/ |
1807x |
Shishi, a free implementation of the Kerberos 5 network security system.
|
|
GnuPG.pm |
http://indev.insu.com/GnuPG/ |
1802x |
The GnuPG perl module interfaces with the Gnu Privacy Guard using the coprocess hooks provided by gpg.
|
|
trapdoor2 |
http://oss.linbit.com/trapdoor2/ |
1798x |
Trapdoor2 (td2) allows remote users to execute local commands by sending 'magic cookies'. this can e.g. be used to alter local firewalling rules so people can connect to local services after sending the magick cookie.
|
|
fcatalog |
http://fcatalog.lupine.org/ |
1796x |
fcatalog is a program for identifying the origins of files. Though its operation is similar to the operation of file-checksum-checking security utilities (like tripwire), its purpose and methodology is different.
|
|
chkrootkit |
http://www.chkrootkit.org/ |
1795x |
chkrootkit to narzędzie do lokalnego wykrywania rootkitów. Pakiet zawiera chrootkit: skrypt powłoki, który sprawdza binarki systemowe w poszukiwaniu modyfikacji rootkitem. Jest w stanie sprawdzić: aliens, asp, bindshell, lkm, rexedcs, sniffer, wted, z2, amd, basename, biff, chfn, chsh, cron, date, du, dirname, echo, egrep, env, find, fingerd, gpm, grep, hdparm, su, ifconfig, inetd, inetdconf, identd, killall, login, ls, mail, mingetty, netstat, named, passwd, pidof, pop2, pop3, ps, pstree, rpcinfo, rlogind, rshd, slogin, sendmail, sshd, syslogd, tar, tcpd, top, telnetd, timed, traceroute i write.
|
|
pyCA |
http://www.pyca.de/ |
1789x |
pyCA tries to make it easier for people to set up and run a organizational certificate authority which fulfills the need for a fairly secure certification processing.
|
|
LinVPN |
http://mrtg.planetmirror.com/pub/linvpn/ |
1785x |
LinVPN allows you to create a VPN (Virtual Private Network) from linux to linux. Normally both are gateways of a LAN, then the LANs behind them may access each other over an encrypted tunnel created by the software.
|
|
fe3d |
http://projects.icapsid.net/fe3d/ |
1784x |
fe3d is a 3D visualization tool for network (security) information. It has support for nmap and (limited) support for languard XML log files.
|
|