RSS 40 projects tagged "HP-UX"

Download Website Updated 15 Dec 2003 /dev/random for HP-UX 11.00

Screenshot
Pop 35.20
Vit 1.43

/dev/random for HP-UX 11.00 provides a device driver that generates high-quality random numbers.

Download Website Updated 14 Mar 2006 Auth MemCookie

Screenshot
Pop 18.57
Vit 1.00

Auth MemCookie is an Apache v2 authentication and authorization module based on a cookie authentication mechanism. The module doesn't do authentication by itself, but verifies if the cookie used for authentication is valid for each URL protected by the module. The module also validates whether the authenticated user has authorization to access the URL. Authentication is done externally through an authentication form page, and all authentication information necessary to the module is a stored in memcached.

Download Website Updated 01 Sep 2003 Automated Password Generator

Screenshot
Pop 313.62
Vit 5.43

Automated Password Generator is a set of tools for random password generation including a standalone password generator, an RFC972 password generation server, and a Perl client for the password generation server. These feature a built-in X9.17 random number generator, and 35 modes of password generation, including pronounceable password generation.

No download Website Updated 30 Jan 2012 Bastille Linux / Unix

Screenshot
Pop 389.85
Vit 14.93

Bastille Unix (formerly Bastille Linux) aims to be the most comprehensive, flexible, and educational Security Hardening Program for Red Hat (Fedora Core, Enterprise Linux, and original Red Hat), SuSE, Gentoo, Mandrake, and Debian Linux, as well as HP-UX and Mac OS X. Virtually every task it performs is optional, providing immense flexibility. It educates the installing admin regarding the topic at hand before asking any question. The interactive nature allows the program to be more thorough when securing, while the educational component produces an admin who is less likely to compromise the increased security.

Download Website Updated 05 Jan 2004 Big Brother

Screenshot
Pop 245.34
Vit 7.09

Big Brother is a combination of monitoring methods. Unlike SNMP where information is just collected and devices polled, Big Brother is designed in such a way that each local system broadcasts its own information to a central location. Simultaneously, Big Brother also polls all networked systems from a central location. This creates a highly efficient and redundant method for proactive network monitoring.

Download Website Updated 13 Apr 2004 C-Kermit

Screenshot
Pop 146.22
Vit 2.95

C-Kermit is a combined serial and network communication software package offering a consistent, medium-independent, cross-platform approach to connection establishment, terminal sessions, file transfer, character-set translation, numeric and alphanumeric paging, and automation of communication tasks. Recent versions include FTP and HTTP clients as well as an SSH interface, all of which can be scripted and aware of character-sets. It supports built-in security methods, including Kerberos IV, Kerberos V, SSL/TLS, and SRP, FTP protocol features such as MLSD, and source-code parity with Kermit 95 2.1 for Windows and OS/2.

Download Website Updated 13 Dec 2001 CDSA 2

Screenshot
Pop 40.62
Vit 1.49

CDSA stands for Common Data Security Architecture. It provides a security framework that includes cryptographically signed modules to present an abstracted unified API to the application developer to perform cryptographic and security related operations. It also includes hardware support for cryptographic tokens and biometric devices, such as thumbprint scanners. Intel has implemented the CDSA 2 specification and released it as open source.

No download Website Updated 17 Sep 2003 CyberFusion

Screenshot
Pop 13.89
Vit 62.16

CyberFusion is a system that provides secure file transfer across a LAN, a WAN, and the Internet. It offers encryption and security, reliability and guaranteed delivery, management and automation, audit and control. It offers cost-saving migration from competitor products such as Connect:Direct which is supported with useful tools. It may be used as part of a VPN, ERP, EAI, or ETL software solution for secure file transfers as well as in disaster recovery, data archive, and backup and restore operations.

Download Website Updated 15 Oct 2008 DansGuardian

Screenshot
Pop 688.00
Vit 13.97

DansGuardian is a Web content filtering proxy that uses Squid to do all the fetching. It filters using multiple methods including, but not limited to, phrase matching, file extension matching, MIME type matching, PICS filtering, and URL/domain blocking. It has the ability to switch off filtering by certain criteria including username, domain name, source IP, etc. The configurable logging produces a log in an easy to read format. It has the option to only log text-based pages, thus significantly reducing redundant information (such as every image on a page).

Download Website Updated 09 Jul 2008 Dnmalloc

Screenshot
Pop 31.87
Vit 1.00

Dnmalloc is an allocator that keeps heap management data separate from the heap itself. As a result, dnmalloc is not vulnerable to corruption of the heap management information by heap buffer overflows or double free errors.

Screenshot

Project Spotlight

Tulip

Software for visual analysis of relational data.

Screenshot

Project Spotlight

EFL

Software that provides ready to use CFEngine policy.