losetup-utils are three bash scripts that attempt to make the use of losetup a bit easier and faster. losetup can be fast, easy, and practical if you need to transport sensitive information over the Internet or in CD's, DVD's, or a pendrive. Also, if you want to store private data on your hard disk or in the cloud, an encrypted volume can be a convenient choice. The types of encryption can be any installed on the system.
123 Protect is a solution to manage member accounts on a Web site and protect resources on the site with passwords. Passwords can be used to protect the whole site, individual pages, and directories. Password protection recursively applies to contents of a directory. The system provides three levels of administration, a user-friendly interface, an advanced membership management system, and multi-language support. It doesn't require knowledge of PHP or HTML.
The Analysis Console for Intrusion Databases (ACID) is a PHP-based analysis engine to search and process a database of incidents generated by security-related software such as IDSes and firewalls (e.g., Snort or ipchains). It provides a search interface for finding alerts matching practically any criteria. This includes arrival time, signature time, source/dest address/port, flags, payload, etc. ACID also provides the ability to annotate and logically group related events, delete false positives, or archive alerts among databases. Finally, a variety of statistics and graphs can be generated based on time, IP address, ports, alert classification, and sensor.
AIM Sniff is a utility for monitoring and archiving AIM and MSN messages across a network. It can be used to monitor for cases of harassment or warez trading. It has the ability to do a live dump (actively sniff the network) or read a PCAP file and parse the file for IM messages. You also have the option of dumping the information to a MySQL database or STDOUT. AIM Sniff will also monitor for an IM login and then perform an SMB lookup on the originating computer in order to match NT Domain names with IM login names (handles).
Access Control Designer is a universal modular tool for visually designing access control policies. The user of this system depicts requirements for the designed security policy in a graphical notation based on a generally accepted security model. The tool will then generate a configuration of security mechanisms, which will be used for the implementation of the security policy. Modularity of the tool will allow users to design security policies for a lot of various environments - systems needed to have access controlled. A pluggable module API allows third-party programmers to provide ACD modules for systems and so allow users to use ACD for designing access control policies for the systems.