RSS 56 projects tagged "LGPL"

Download Website Updated 16 Jan 2012 p0f

Screenshot
Pop 587.95
Vit 8.97

p0f is a versatile passive OS and application fingerprinter, and a tool for detecting NAT/connection sharing. It is useful for penetration testing, routine network monitoring, and forensics, and to aid abuse detection tools such as IDSes, spam filters, or honeypots.

Download Website Updated 28 Aug 2013 pam_mount module

Screenshot
Pop 479.02
Vit 41.62

pam_mount is a Pluggable Authentication Module that can mount volumes for a user session upon login, using the same passwords as for login. It supports any filesystem your kernel is capable of, including FUSE, SMB/CIFS, various crypto types, and more.

Download Website Updated 16 Mar 2014 nss-pam-ldapd

Screenshot
Pop 392.43
Vit 65.34

nss-pam-ldapd is a Name Service Switch module and Pluggable Authentication Module using an LDAP server. It allows your LDAP server to provide user account, group, host name, alias, netgroup, and almost any other information that you would normally get from /etc flat files or NIS, and allows you to do authentication to an LDAP server.

Download Website Updated 10 May 2009 procps

Screenshot
Pop 362.66
Vit 11.19

procps is a package of utilities which includes ps, vmstat, top, w, skill, snice, pgrep, pkill, free, sysctl, pmap, uptime, and kill. These utilities report what is running, who is logged in, how long the system has been running, and what is using up memory. They can be used to kill processes and change run-time kernel configuration values.

Download Website Updated 18 Feb 2010 Openwall Linux kernel patch

Screenshot
Pop 235.38
Vit 14.60

The Openwall Linux kernel patch is a collection of security "hardening" features for the Linux kernel. In addition to the new features, some versions of the patch contain various security fixes. The "hardening" features of the patch, while not a complete method of protection, provide an extra layer of security against the easier ways to exploit certain classes of vulnerabilities and/or reduce the impact of those vulnerabilities. The patch can also add a little bit more privacy to the system by restricting access to parts of /proc so that users may not see what others are doing.

Download Website Updated 22 May 2007 J2SSH

Screenshot
Pop 153.00
Vit 5.10

J2SSH is an object-orientated Java implementation of the SSH version 2 protocol. It provides a rich, powerful, and extensible SSH API that enables developers to gain access to SSH servers and to develop entire SSH client/server frameworks. The API library provides a fully-featured SSH2 implementation specifically designed for cross-platform development. Higher level components, representing both the standard SSH client and SSH servers, are provided which implement the protocol specification for user sessions and port forwarding. The specification currently supports public key and password authentication and a full implementation of the SFTP protocol.

Download Website Updated 22 Dec 2010 fakechroot

Screenshot
Pop 121.86
Vit 5.65

fakechroot provides a fake chroot environment to programs. A fake chroot allows you to run programs which require root privileges on an unprivileged user account. For example, you can create a Debian bootstrap or a development environment and build packages inside a chroot'ed system using a standard non-root user account. You can then use the apt-get command to install other packages without root privileges.

No download Website Updated 10 Mar 2002 Extended Attributes and ACLs for Linux

Screenshot
Pop 109.79
Vit 3.47

Linux, in the tradition of UNIX-like operating systems, implements file system permissions using a rather coarse scheme. While this is sufficient for a surprisingly large set of applications, it is too inflexible for many other scenarios. For that reason, all the major commercial UNIX operating systems have extended this simple scheme in one way or the other. This is an effort to implement POSIX-like Access Control Lists for Linux. Access Control Lists are built on top of Extended Attributes, which can also be used to associate other pieces of information with files such as Filesystem Capabilities, or user data like mime type and search keywords.

Download No website Updated 03 Jan 2014 Config::Model::OpenSsh

Screenshot
Pop 101.35
Vit 12.65

Config::Model::OpenSsh is a graphical configuration editor for OpenSSH configuration files (e.g. /etc/ssh/sshd_config, /etc/ssh/ssh_config, or ~/.ssh/config). Other user interfaces (curses and terminal) are also available. Programmers can choose to use the Perl API to modify or validate OpenSSH configuration. This program is based on Config::Model.

Download Website Updated 16 Apr 2011 Augeas

Screenshot
Pop 94.66
Vit 6.62

Augeas is a configuration API and editing tool. It parses common configuration files like /etc/hosts or /etc/grub.conf in their native formats and transforms them into a tree. Configuration changes are made by manipulating this tree and saving it back into native configuration files.

Screenshot

Project Spotlight

confluence-el

An Emacs extension for interacting with a Confluence wiki.

Screenshot

Project Spotlight

Aspose.Pdf for Reporting Services

A system to generate PDF reports from MS SQL Server 2000 & 2005 Reporting Services.