|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FIRST <<< | PREV < | Showing items 346 to 360 | > NEXT | >>> LAST |
| SW Name | Home page | Downloaded |
|---|---|---|
| Bash Port Knocking | http://www.phantomcode.com/[..]portknocking/ | 2264x |
| Bash Port Knocking is a set of scripts that use standard Linux tools to acheive a port knocking system. A Web page is used to open ports, and an email is sent each time the port knocking sequence is successfully achieved. | ||
|
|
OutGuess | http://www.outguess.org/ | 2263x |
| A universal steganographic tool that allows the insertion of hidden information into the redundant bits of data sources. | ||
|
|
Lutz | http://www.codewear.org/[..]s.php?id=lutz | 2262x |
| Lutz is a fast and small port scanner, similar to nmap. It has the most popular scanning options (SYN, FIN, XMAS Scan, PROTO Scan, etc.) and simple OS detection. | ||
|
|
cryptoswap | http://www.flyn.org/[..]ap/index.html | 2262x |
| The cryptoswap package supports building an encrypted swap partition when a system boots. This may be necessary on systems that use encrypted filesystems because plaintext secrets may be written to disk when memory is swapped to disk. | ||
|
|
Yin Yang | http://yinyang.sourceforge.net/ | 2258x |
| Yin Yang is a real-time Linux file scanner that is activated whenever a file is accessed. When a file opening system call is detected, it will send the full pathname of the file to a network daemon. The network daemon will then pass the pathname of the file to a file scanner, such as an anti-virus scanner, and return the status. | ||
|
|
Return-RST | http://www.bellamy.co.nz/[..]section5.html | 2257x |
| Return-RST is a firewalling tool for Linux 2.2.xx systems using IPCHAINS. It uses the netlink device to capture packets and sends TCP RST packets in response to TCP connection requests. | ||
|
|
Secure back door | http://sbd.sourceforge.net/ | 2255x |
| Secure Back Door (SBD) is a tool that provides ultra-secure and minimal access to a computer, which allows you to run a single command based on a one time key. | ||
|
|
Wolverine Firewall | http://webworxmedia.com/Wolverine/ | 2253x |
| Wolverine Firewall, for the easy configuration of IPTables. | ||
|
|
Fwctl | http://indev.insu.com/Fwctl/ | 2252x |
| Fwctl is a program that intends to make it easier to configure a tight firewall. It provides a configuration syntax that is easier to use and more expressive than the low-level primitives offered by ipchains. | ||
|
|
Impost | http://impost.sourceforge.net/ | 2250x |
| Impost is a network security auditing tool designed to analyze the forensics behind compromised and/or vulnerable daemons. There are two different kinds of operating modes; it can either act as a honey pot and take orders from a Perl script controlling how it responds and communicates with connecting clients, or it can operate as a packet sniffer and monitor incoming data to specified destination port. | ||
|
|
fwall | http://linux.fan.lt/fwall/ | 2247x |
| fwall is a user-friendly, highly secure firewall script for iptables. It is based on bash. It includes a configuration for 1-2 interfaces, routing, port forwarding, DoS protection, ICMP and sysctl configuration and so on. | ||
|
|
KWoodhammer | http://kwoodhammer.sourceforge.net/ | 2246x |
| KWoodhammer is the all-in-one solution for traditional encryption methods as you know from Enigma, the Pope or the Russian Secret Service (KGB). | ||
|
|
Stunnel | http://www.stunnel.org/ | 2245x |
| Stunnel is a program that allows you to encrypt arbitrary TCP connections inside SSL (Secure Sockets Layer) available on both Unix and Windows. Stunnel can allow you to secure non-SSL aware daemons and protocols (like POP, IMAP, LDAP, etc) by having Stunnel provide the encryption, requiring no changes to the daemon's code. | ||
|
|
md5mon | http://www.geocities.com/[..]1/md5mon.html | 2243x |
| It checks that certain system files have not been modified and it uses "md5sum" to compute checksums of files, reporting any differences from previously recorded checksums. Optionally, a somewhat more secure, but slower, "shasum" can be used instead of "md5sum". | ||
|
|
Panoptis | http://sourceforge.net/[..]ects/panoptis | 2240x |
| Panoptis plans to create a network security tool (N-IDS) to detect and block DoS and DDoS attacks. The programming language is C++, and the input is being provided by routers. | ||
|
|
||
| FIRST <<< | PREV < | Showing items 346 to 360 | > NEXT | >>> LAST |
| 1. |
Pacman linux Download: 5862x |
| 2. |
FreeBSD Download: 10084x |
| 3. |
PCLinuxOS-2010 Download: 9571x |
| 4. |
alcolix Download: 12181x |
| 5. |
Onebase Linux Download: 10912x |
| 6. |
Novell Linux Desktop Download: 0x |
| 7. |
KateOS Download: 7312x |
| 1. |
xinetd Download: 3505x |
| 2. |
RDGS Download: 937x |
| 3. |
spkg Download: 6546x |
| 4. |
LinPacker Download: 11783x |
| 5. |
VFU File Manager Download: 4013x |
| 6. |
LeftHand Mała Księgowość Download: 8378x |
| 7. |
MISU pyFotoResize Download: 3732x |
| 8. |
Lefthand CRM Download: 4558x |
| 9. |
MetadataExtractor Download: 0x |
| 10. |
RCP100 Download: 4108x |
| 11. |
Predaj softveru Download: 0x |
| 12. |
MSH Free Autoresponder Download: 0x |
linuxsoft.cz
| Design: www.megadesign.cz