Access Control Designer is a universal modular tool for visually designing access control policies. The user of this system depicts requirements for the designed security policy in a graphical notation based on a generally accepted security model. The tool will then generate a configuration of security mechanisms, which will be used for the implementation of the security policy. Modularity of the tool will allow users to design security policies for a lot of various environments - systems needed to have access controlled. A pluggable module API allows third-party programmers to provide ACD modules for systems and so allow users to use ACD for designing access control policies for the systems.
Access Road is a universal simulator of access controls that is intended to improve design and auditing of IT security. It provides simulations of GNU/Linux (components and rights on the file system), MySQL Server (components and privileges), and a generic Role-Based-Access-Control application. It is designed for database, system, and application administrators, IT architects and developers, and auditors. Reliability and the ability to explain the results are the main objectives. Tutorials of 80 pages are provided. A powerful framework allows new simulations to be added.
AnomicFTPD is an RFC959-compliant FTP server with OS- independent user and group management. Active and passive modes, non-root mode, and anonymous and/or read-only modes are supported. A built-in client IP filter acts as a firewall and provides additional access limitation. The server has no online interface; attributes, groups, and user accounts are configured through text files. The protocol/ format-unspecified LIST command produces output that is compatible with most FTP clients, including common Web browsers in FTP mode.
AnyClient is a platform-independent file transfer application that supports all major file transfer protocols including FTP/S, SFTP, and WebDAV/S. It is available both as a Web-based service requiring no software installation, and as a downloadable application that you can install locally.
AuthenticRoast allows you to build highly flexible authentication mechanisms for the Java Web tier. This can be anything from HTTP Basic authentication to authenticating with openid, facebook, or your company's Kerberos setup. The authentication modules can be combined at will and even changed at runtime. This currently works for glassfish and plain Tomcat, and allows you to use all the features of container-managed security without being constrained to the simple login methods provided.
Awesum is a graphical checksum verification utility. It is very easy to use and includes support for both MD5 and SHA checksum algorithms. Unlike many checksum verification utilities, it features a progress bar that makes working with large files (such as CD-ROM ISO images) much more bearable.
BEJY is a modular server application. It is packaged, by default, as a Web application container and mail server with SSL. It has functionality similar to inetd, and has some helper classes/functions to ease the implementation of new protocols. It provides a generic multithreaded TPC/IP server implementation with optional SSL support, covering the complete connection and thread management. Each supported service provides its protocol implementation. The current version comes with HTTP, SMTP, POP3, and IMAP protocol implementations. The HTTP protocol implementation also contains a servlet engine, a JSP 1.2 engine, a handler to invoke CGI, and other useful things. The mail protocols require a database using JDBC, as MySQL, MSSQL, and others.
Bandit is a system of loosely-coupled components that provide consistent identity services and create a community that organizes and standardizes identity-related technologies in an open way, promoting both interoperability and collaboration. It implements open standard protocols and specifications so identity services can be constructed, accessed, and integrated from multiple identity sources. The Bandit system supports many authentication methods and provides user-centric credential management.