|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FIRST <<< | PREV < | Showing items 181 to 195 | > NEXT | >>> LAST |
| SW Name | Home page | Downloaded |
|---|---|---|
| Horatio: Authenticated Network Access | http://www.cs.utexas.edu/[..]ware/horatio/ | 1807x |
| The Horatio system is a firewall authentication tool. The premise: legitimate users want to attach laptops and other mobile hosts to the network, but security demands that illegitimate users be prevented from accessing the internal, secure network and from abusing the general Internet. The approach taken by Horatio is to provide a separate, untrusted network that only connects to the internal network (and thus to the Internet) through a firewall that by default does not pass any traffic. The user must point a Web browser at the Horatio web server, which runs on the firewall machine, and provide a username and password. | ||
|
|
CODEX | http://www.umiacs.umd.edu/[..]mmarsh/CODEX/ | 1805x |
| CODEX is designed for applications with a moderate number of clients (tens or hundreds) requesting keys that change often but not continuously (on the scale of minutes to hours). | ||
|
|
Tknetbus | http://computer.freepage.de/linux-azubi/ | 1804x |
| Tcl/TK-Client for the netbusserver, a trojan which allows intruders to control the computer with netbusservers running on | ||
|
|
authforce | http://kapheine.hypa.net/authforce/ | 1803x |
| Authforce is an HTTP authentication brute forcer. Using various methods, it attempts brute force username and password pairs for a site. | ||
|
|
SRP | http://srp.stanford.edu/ | 1803x |
| SRP is a secure password-based authentication and key-exchange protocol. | ||
|
|
Worm Warner | http://www.jeroen.se/ | 1799x |
| WormWarner is a tool designed to warn hosts that are probably infected by worms. | ||
|
|
ADMsmb | http://www.void.irq.org/ | 1798x |
| ADMsmb is a security scanner for Samba based on the source of smbclient. It will get the netbios name, share list, workgroup, domain, and OS. | ||
|
|
KeyNote | http://www.cis.upenn.edu/[..]/keynote.html | 1797x |
| KeyNote is a simple and flexible trust-management system designed to work well for a variety of large- and small- scale Internet-based applications. | ||
|
|
sbd | http://www.cycom.se/dl/sbd | 1796x |
| Sbd is a Netcat-clone, designed to be portable and offer strong encryption. It runs on Unix-like operating systems and on Microsoft Win32 | ||
|
|
OpenSSH SecurID patch | http://www.omniti.com/[..]sus/projects/ | 1796x |
| This patch integrates SecurID authentication services directly into the OpenSSH daemon, allowing users to use SecurID tokens directly as their passwords instead of relying on the clunky sdshell. | ||
|
|
squidefender | http://www.jeroen.se/[..]idefender.php | 1794x |
| Squidefender is a perl script which parses a squid log file in native format for attacks. | ||
|
|
leetnet | http://www.leetnet.org/ | 1793x |
| Leetnet is a dynamic network of small networks connected securely via the Internet using the IPSEC protocol. Managed by a central web interface and database, all networks can establish secure IPSEC VPN connections despite such complications as dynamic IP addresses, different IPSEC implementations, large numbers of tunnels, multiple users, and overall complexity related to IPSEC VPN use. Leetnet also serves as a central registrar for private networks, guaranteeing network uniqueness and connectivity with other Leetnet networks. | ||
|
|
NuFW | http://www.nufw.org/[..].php3?lang=en | 1791x |
| NuFW is an enterprise grade firewall that performs an authentication of every single connection passing through the IP filter, by transparently requesting user’s credentials before any filtering decision is taken. | ||
|
|
pam_ccreds | http://www.padl.com/[..]m_ccreds.html | 1790x |
| The pam_ccreds module provides the means for Linux workstations to locally authenticate using an enterprise identity when the network is unavailable. | ||
|
|
ISIC | http://packages.debian.org/[..]/net/isic.htm | 1789x |
| ISIC (and components) is intended to test the integrity of an IP Stack and its component stacks (TCP, UDP, ICMP et. al.) It does this by generating controlled random packets. You can use ISIC for testing if a firewall leaks packets, or how well an IDS functions. | ||
|
|
||
| FIRST <<< | PREV < | Showing items 181 to 195 | > NEXT | >>> LAST |
| 1. |
Pacman linux Download: 5578x |
| 2. |
FreeBSD Download: 9799x |
| 3. |
PCLinuxOS-2010 Download: 9294x |
| 4. |
alcolix Download: 11776x |
| 5. |
Onebase Linux Download: 10462x |
| 6. |
Novell Linux Desktop Download: 0x |
| 7. |
KateOS Download: 6959x |
| 1. |
xinetd Download: 3073x |
| 2. |
RDGS Download: 937x |
| 3. |
spkg Download: 6014x |
| 4. |
LinPacker Download: 11226x |
| 5. |
VFU File Manager Download: 3793x |
| 6. |
LeftHand Mała Księgowość Download: 8038x |
| 7. |
MISU pyFotoResize Download: 3497x |
| 8. |
Lefthand CRM Download: 4296x |
| 9. |
MetadataExtractor Download: 0x |
| 10. |
RCP100 Download: 3801x |
| 11. |
Predaj softveru Download: 0x |
| 12. |
MSH Free Autoresponder Download: 0x |
linuxsoft.cz
| Design: www.megadesign.cz