RSS 353 projects tagged "OS Independent"

Download Website Updated 12 Mar 2009 .SE DNSSEC Monitor Tools

Screenshot
Pop 41.81
Vit 1.00

.SE DNSSEC Monitor Tools is a handful of tools to monitor DNSSEC signed zones.

Download Website Updated 27 Jul 2001 ACID

Screenshot
Pop 145.62
Vit 1.00

The Analysis Console for Intrusion Databases (ACID) is a PHP-based analysis engine to search and process a database of incidents generated by security-related software such as IDSes and firewalls (e.g., Snort or ipchains). It provides a search interface for finding alerts matching practically any criteria. This includes arrival time, signature time, source/dest address/port, flags, payload, etc. ACID also provides the ability to annotate and logically group related events, delete false positives, or archive alerts among databases. Finally, a variety of statistics and graphs can be generated based on time, IP address, ports, alert classification, and sensor.

Download Website Updated 11 Apr 2011 ACL2

Screenshot
Pop 74.51
Vit 4.97

ACL2 is a mathematical logic, programming language, and mechanical theorem prover based on the applicative subset of Common Lisp. It is an "industrial-strength" version of the NQTHM or Boyer/Moore theorem prover, and has been used for the formal verification of commercial microprocessors, the Java Virtual Machine, interesting algorithms, and so forth.

Download Website Updated 30 May 2003 Access Control Designer

Screenshot
Pop 48.37
Vit 1.00

Access Control Designer is a universal modular tool for visually designing access control policies. The user of this system depicts requirements for the designed security policy in a graphical notation based on a generally accepted security model. The tool will then generate a configuration of security mechanisms, which will be used for the implementation of the security policy. Modularity of the tool will allow users to design security policies for a lot of various environments - systems needed to have access controlled. A pluggable module API allows third-party programmers to provide ACD modules for systems and so allow users to use ACD for designing access control policies for the systems.

Download No website Updated 04 Jun 2013 Access Road

Screenshot
Pop 106.75
Vit 11.29

Access Road is a universal simulator of access controls that is intended to improve design and auditing of IT security. It provides simulations of GNU/Linux (components and rights on the file system), MySQL Server (components and privileges), and a generic Role-Based-Access-Control application. It is designed for database, system, and application administrators, IT architects and developers, and auditors. Reliability and the ability to explain the results are the main objectives. Tutorials of 80 pages are provided. A powerful framework allows new simulations to be added.

Download Website Updated 28 May 2009 Advisory Check

Screenshot
Pop 72.50
Vit 2.40

Advisory Check is a program that reads security advisories for you. It gathers security advisories using RSS, RDF, or XML feeds, compares them against the installed software, and alerts you if you're vulnerable. A wide variety of package managers can be queried to detect installed software. Remote systems can be monitored by using the integrated SSH, Windows-RPC, and Nmap support.

No download Website Updated 07 May 2001 Alamin GSM SMS Gateway

Screenshot
Pop 210.03
Vit 2.73

The Alamin GSM SMS Gateway is a group of daemons that allows you to send/receive SMS messages from any GSM device that supports AT+ commands (GSM modems or GSM mobile phones) or supported by Gnokii. A client program allows you to send messages from any IP client. An SMTP interface is provided to allow MTAs to send SMS directly to the GSM network. IMP (Incoming Message Processor) modules allows you to extend functionality to implement banking, network administration, bd querys, etc. from a GSM mobile phone.

Download Website Updated 28 Jan 2009 AnomicFTPD

Screenshot
Pop 30.66
Vit 1.94

AnomicFTPD is an RFC959-compliant FTP server with OS- independent user and group management. Active and passive modes, non-root mode, and anonymous and/or read-only modes are supported. A built-in client IP filter acts as a firewall and provides additional access limitation. The server has no online interface; attributes, groups, and user accounts are configured through text files. The protocol/ format-unspecified LIST command produces output that is compatible with most FTP clients, including common Web browsers in FTP mode.

Download Website Updated 10 Sep 2013 Another File Integrity Checker

Screenshot
Pop 277.78
Vit 30.82

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. You can then run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Download Website Updated 17 Nov 2013 Anti Inference Hub

Screenshot
Pop 42.11
Vit 39.51

Anti Inference Hub is the first dynamic query processing engine that defends against the inference problem in multilevel databases by integrating smoothly with common DBMSs (Oracle, PostgreSQL, and MySQL), and monitoring queries submitted by users.

Screenshot

Project Spotlight

JSONMinify

A JSON+C minifier.

Screenshot

Project Spotlight

Attic

A deduplicating backup program.