My Account

Related categories 1

The Coroner's Toolkit (TCT) provides post-break-in data collection that could be useful in determining what happened. Less polished that the authors (Dan Farmer and Wietse Venema) usual work, the toolkit offers a patch-work of tools that help exhume interesting stuff from violated systems. Should be installed and examined before a break-in happens!
OpenPGP (RFC2440) implementation from the GNU project. Encrypts/decrypts/signs/digests files using strong cryptography. FAQ, downloads, documentation.
Tools such as tcpdump and traceroute.
Allows improved monitoring and alerting based on the contents of system logs.
lsof is a tool for examining I/O channels open on your Unix system. These can include files, FIFOs and network sockets. This information can be extremely useful for security and a variety of other purposes. Works on most Unix-like systems.
Unix system and security auditing tool.
A replacement for the Unix crypt, using several block algorithms in several modes like cbc, and cfb.
Efficient stealth port scanner. Downloads, e-mail lists, news.
Strong cryptographic software, libraries, and information about cryptography, data security, and privacy.
Open source implementation of SSH1 and SSH2 protocols. Ported from OpenBSD by the OpenSSH portability team.
The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, fully featured, and Open Source toolkit implementing the Secure Sockets Layer and Transport Layer Security protocols with full-strength cryptography world-wide.
Daemon implementing IDENT protocol, it can be used to identify the user who initiated a TCP/IP connection
Drop-in Sendmail replacement by Wietse Venema. Offers several features that make it difficult to crack.
(Security Administrator's Integrated Network Tool) Scans systems and networks and reports potential vulnerabilities.
Run selected commands as root, with the users' own password. Allows the administrator to grant limited root privileges to a subset of users, without giving out the root password.
Open source version of the original Unix file integrity scanner. Calculates and stores signatures of file permissions, ownership and contents. Scans the same files later, detecting changes. This open source version is targeted at Linux systems.
(Security Administrator's Integrated Network Tool) Scans systems and networks and reports potential vulnerabilities.
lsof is a tool for examining I/O channels open on your Unix system. These can include files, FIFOs and network sockets. This information can be extremely useful for security and a variety of other purposes. Works on most Unix-like systems.
Open source version of the original Unix file integrity scanner. Calculates and stores signatures of file permissions, ownership and contents. Scans the same files later, detecting changes. This open source version is targeted at Linux systems.
Unix system and security auditing tool.
Open source implementation of SSH1 and SSH2 protocols. Ported from OpenBSD by the OpenSSH portability team.
Allows improved monitoring and alerting based on the contents of system logs.
A replacement for the Unix crypt, using several block algorithms in several modes like cbc, and cfb.
The Coroner's Toolkit (TCT) provides post-break-in data collection that could be useful in determining what happened. Less polished that the authors (Dan Farmer and Wietse Venema) usual work, the toolkit offers a patch-work of tools that help exhume interesting stuff from violated systems. Should be installed and examined before a break-in happens!
Daemon implementing IDENT protocol, it can be used to identify the user who initiated a TCP/IP connection
Efficient stealth port scanner. Downloads, e-mail lists, news.
Tools such as tcpdump and traceroute.
OpenPGP (RFC2440) implementation from the GNU project. Encrypts/decrypts/signs/digests files using strong cryptography. FAQ, downloads, documentation.
The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, fully featured, and Open Source toolkit implementing the Secure Sockets Layer and Transport Layer Security protocols with full-strength cryptography world-wide.
Drop-in Sendmail replacement by Wietse Venema. Offers several features that make it difficult to crack.
Run selected commands as root, with the users' own password. Allows the administrator to grant limited root privileges to a subset of users, without giving out the root password.
Strong cryptographic software, libraries, and information about cryptography, data security, and privacy.
Last update:
February 9, 2019 at 19:57:21 UTC
Computers
Games
Health
Home
News
Recreation
Reference
Regional
Science
Shopping
Society
Sports
All Languages
Arts
Business