RSS 930 projects tagged "Linux"

No download Website Updated 05 May 2005 BitDefender AntiVirus for Samba

Screenshot
Pop 36.85
Vit 1.87

BitDefender AntiVirus for Samba protects Samba servers running under Linux from viruses and other malware. It's configured for "On-Access" scanning of the files that are copied to or are accessed from the Samba file server's shared partitions. BitDefender claims 100% detection rate for all viruses in the wild (ITW) through its powerful scanning engines certified by Virus Bulettin in April 2005.

No download Website Updated 23 Feb 2004 BitDefender Antivirus Scanner for Unices

Screenshot
Pop 37.42
Vit 1.43

BitDefender Antivirus Scanner for Unices is a powerful on-demand antivirus scanner for command lines and shell scripts. It supports manual scanning of individual files or entire file systems, malicious code detection, and disinfection. After each scan, a detailed report of displayed positive virus detections is displayed. It uses scanning engines that are certified by prestigious testing labs to scan regular files, multi-level archives, packed files, email messages (eml), and password protected archives.

No download Website Updated 25 May 2005 BitDefender Mail Protection

Screenshot
Pop 63.80
Vit 2.87

BitDefender Mail Protection is a powerful mail filtering solution that provides antivirus and antispam capabilities to Linux mail servers. Both sent and received messages are scanned in real-time, avoiding possible infections and preventing anyone from sending an infected message. It claims a 100% detection rate for all viruses in the wild through its powerful scanning engines, which are certified by prestigious testing labs.

No download Website Updated 19 Jul 2006 BlockSSHD

Screenshot
Pop 31.75
Vit 1.77

BlockSSHD protects computers from SSH brute force attacks by dynamically blocking IP addresses by adding iptables rules.

Download Website Updated 28 Feb 2008 BlueProximity

Screenshot
Pop 80.16
Vit 2.94

BlueProximity helps add a little more security to the desktop. It does so by detecting a certain Bluetooth device, most likely a mobile phone, and keeping track of its distance. If it is moved away from the computer and the distance is above a certain level (no measurement in meters is possible) for a given time, it automatically locks the desktop (or starts any other shell command wanted). Once away, the computer awaits its master's return: if the device is nearer than a given level for a set time, the computer unlocks without any interaction (or starts any other shell command wanted).

Download Website Updated 27 Dec 2007 Bluediving

Screenshot
Pop 58.51
Vit 3.04

Bluediving is a Bluetooth penetration testing suite. It implements attacks like Bluebug, BlueSnarf, BlueSnarf++, and BlueSmack, has features such as Bluetooth address spoofing, an AT and a RFCOMM socket shell, and implements tools like carwhisperer, BSS, L2CAP packet generator, L2CAP connection resetter, RFCOMM scanner, and greenplaque scanning mode (using more than one HCI device).

Download Website Updated 10 Feb 2013 Bluefog

Screenshot
Pop 62.28
Vit 1.83

Bluefog is a tool that can generate an essentially unlimited number of phantom Bluetooth devices. It can be used to test Bluetooth scanning and monitoring systems, make it more difficult for attackers to lock onto your devices, or otherwise complicate the normal operation of Bluetooth devices. Technically, Bluefog can work with just one Bluetooth adapter, but it works much better when you connect multiple adapters. Up to four radios are currently supported simultaneously.

Download Website Updated 02 Nov 2013 Bluelog

Screenshot
Pop 164.73
Vit 9.71

Bluelog is a Bluetooth site survey tool, designed to tell you how many discoverable devices there are in an area as quickly as possible. Bluelog differs from most Bluetooth scanners in that it prioritizes speed of reporting over anything else (i.e. it doesn't spend time trying to pull detailed data from a device) and doesn't require any user intervention to function. As the name implies, its primary function is to log discovered devices to file rather than to be used interactively. Bluelog could run on a system unattended for long periods of time to collect data. In addition to basic scanning, Bluelog also has a unique feature called "Bluelog Live", which puts results in a constantly updating Web page which you can serve with your HTTP daemon of choice.

Download Website Updated 13 Jul 2010 Bombardier Installer

Screenshot
Pop 69.96
Vit 1.44

Bombardier is a software system that delivers visibility, control, and automation to data center environments. Bombardier provides a means for changes to be rolled out to a network of Linux and Windows servers in a highly controlled way, providing optimum security, logging, and centralized change control.

Download Website Updated 03 Mar 2013 Botan

Screenshot
Pop 442.44
Vit 42.71

Botan is a crypto library written in C++. It provides a variety of cryptographic algorithms, including common ones such as AES, MD5, SHA, HMAC, RSA, Diffie-Hellman, DSA, and ECDSA, as well as many others that are more obscure or specialized. It also offers SSL/TLS (client and server), X.509v3 certificates and CRLs, and PKCS #10 certificate requests. A message processing system that uses a filter/pipeline metaphor allows for many common cryptographic tasks to be completed with just a few lines of code. Assembly and SIMD optimizations for common CPUs offers speedups for critical algorithms like AES and SHA-1.

Screenshot

Project Spotlight

Verbiste

A French conjugation system.

Screenshot

Project Spotlight

beets

A media library management system for obsessive-compulsive music geeks.