| Nazwa oprogramowania |
Strona domowa |
Pobierane |
| Keychain |
http://www.gentoo.org/[..]ain/index.xml |
1797x |
|
The keychain script makes handling RSA and DSA keys both convenient and secure.
|
|
|
| FakeBO |
http://cvs.linux.hr/fakebo/ |
1796x |
|
This program fakes trojan servers and logs every attempt from client. It is possible to log attempts to file, stdout, stderr or to syslog. It can send fake pings and replies back to trojan client.
|
|
|
| SystemSearcher |
http://www.geektown.de/ |
1788x |
|
SystemSearcher to linuksowy skaner bezpieczeństwa napisany w Perlu. Skanuje pojedyncze hosty lub podsieci w poszukiwaniu anonimowych serwerów FTP i TFTP, serwerów SMTP, które umożliwiają relaying, serwerów SSH, Telnet, NFS z udostępnionymi katalogami, serwerów poczty i WWW (HTTP/HTTPS), znanych portów trojanów oraz eksploitowalnych skryptów CGI.
|
|
|
| dlogin |
http://davmac.org/dlogin/ |
1766x |
|
dlogin to program zastępujący login, który automatycznie pozwala na automatyczne dodawanie użytkowników logujących się przez wirtualny terminal (lokalny terminal) do grupy lub listy grup tymczasowo. Może to być użyte do zezwolenia takiemu użytkownikowi na zamknięcie systemu, użycie urządzenia audio itp., także jeśli nie jest rootem.
|
|
|
| Antivirus |
http://www.hbedv.com/ |
2x |
|
|
|
|
| TrueCrypt |
http://www.truecrypt.org/ |
0x |
|
Disk partition crypting, USB disks etc.
|
|
|
| ServerProtect for Linux 1.25 |
http://www.trendmicro.com |
0x |
|
Comprehensive Virus Protection for the Linux Platform
Trend Micro™ ServerProtect™ for Linux™ provides comprehensive real-time protection and cleaning against computer viruses, Trojans, and worms for Linux servers and desktops. Managed through an intuitive, Web-based management console - now with Mozilla™ support - ServerProtect allows centralized virus scanning, pattern updates and event reporting. ServerProtect can easily manage virus maintenance tasks such as initiating on-demand scanning, printing/exporting/purging virus logs and setting parameters for real-time scanning.
|
|
|
| BarbWire |
http://www.baraka.ca/BarbWire.asp |
0x |
|
Easily build your own firewall off an old pentium box and Red Hat Linux 7.3. User friendly enterface and very little Tcp/Ip knowledge needed. It can add/delete any number of rules to filter unwanted stuff, nat your internal IPs, reverse nat if you have servers in your lan and many more.
|
|
|
| Maheshabsd |
http://www.freebsd.nfo.sk/[..]aheshaeng.htm |
0x |
|
MaheshaBSD is a Live CD modular distribution based on FreeBSD 8.0 (i386). It can be easily put on a USB stick. Users can surf the Internet anonymously (TOR), easily use Adobe Flash (if they download it; Linux emulation is already activated, and a writable directory is made for Adobe Flash), and use Clamav Antivirus, TestDisk, and PhotoRec. MaheshaBSD also speaks (espeak). Its X environment is based upon IceWM.
|
|
|
| spam fighter |
http://www.spamfighter.com |
0x |
|
an anti spam tool
|
|
|
| Gaim-Encryption |
http://gaim-encryption.sourceforge.net |
0x |
|
Gaim-Encryption provides transparent RSA encryption as a Gaim plugin using the Mozilla NSS libraries.
|
|
|
| RIG (Random Identity Generator) |
http://rig.sourceforge.net/ |
0x |
|
RIG (Random Identity Generator) is a free replacement for a shareware program out there called 'fake'. It generates random, yet real-looking, personal data. It is useful if you need to feed a name to a Web site, BBS, or real person, and are too lazy to think of one yourself. Also, if the Web site/BBS/person you are giving the information to tries to crosscheck the city, state, zip, or area code, it will check out.
|
|
|
| wbmclamav |
http://wbmclamav.labs.libre-entreprise.org/ |
0x |
|
wbmclamav is a webmin module to manage Clam Antivirus (ClamAV).
|
|
|
| CanIt |
http://www.canit.ca/ |
0x |
|
A server-based spam control system.
|
|
|
| ClamShell |
http://home.comcast.net/[..]chwalbrichard |
0x |
|
ClamShell is a user friendly, easy to use graphical front end for the clamscan virus scanning engine. The software is easily customizable to fit a user's system setup. Configure the software to use clamscan wherever it resides on your system. Tell ClamShell where you want to save your scan and virus activity logs. Determine where to keep infected files. And, easily update your virus definitions. All without using the command line.
|
|
|