AAFID (Autonomous Agents for Intrusion Detection) is a distributed monitoring architecture with an orientation towards Intrusion Detection developed at the CERIAS at Purdue University. AAFID2 is a prototype implementation of the architecture that includes several ready-to-work agents, plus development facilities for writing your own.
The Alamin GSM SMS Gateway is a group of daemons that allows you to send/receive SMS messages from any GSM device that supports AT+ commands (GSM modems or GSM mobile phones) or supported by Gnokii. A client program allows you to send messages from any IP client. An SMTP interface is provided to allow MTAs to send SMS directly to the GSM network. IMP (Incoming Message Processor) modules allows you to extend functionality to implement banking, network administration, bd querys, etc. from a GSM mobile phone.
arc is an ASN.1 compiler written by FORGE Research for use in internal projects. It is being released under a BSD-like licence. arc creates Java source code that uses the basic ASN.1 classes that were created for use with other FORGE projects. These basic ASN.1 classes are included in the arc distribution.
Astaro Security Gateway (formerly Astaro Security Linux) is an all-in-one network security gateway that includes a firewall, intrusion protection, antivirus, spam protection, URL filtering, and a VPN gateway. Features include a modern packet filter, intrusion detection and prevention, portscan detection, application control, content filtering, virus detection for email and Web traffic, profile handling, L2TP, IPSec, SSL, and PPTP VPN tunneling, spam blocking, proxies for HTTPS, HTTP, FTP, POP3, SMTP, DNS, VoIP, SOCKS, and Ident, logging, and reporting. It supports Ethernet, VLAN, PPP, PPPoE, PPPoA, Cable Modem, IPv6, QoS, Link Aggregation, and WAN-Uplink-Load balancing in routing, and bridge mode. The WebAdmin GUI, Install Wizard, Change Tracking, Printable Configuration, and Up2Date service make it easy to install, manage, and maintain.
Bastille Unix (formerly Bastille Linux) aims to be the most comprehensive, flexible, and educational Security Hardening Program for Red Hat (Fedora Core, Enterprise Linux, and original Red Hat), SuSE, Gentoo, Mandrake, and Debian Linux, as well as HP-UX and Mac OS X. Virtually every task it performs is optional, providing immense flexibility. It educates the installing admin regarding the topic at hand before asking any question. The interactive nature allows the program to be more thorough when securing, while the educational component produces an admin who is less likely to compromise the increased security.
BCWipe securely erases data from magnetic and solid-state memory, by repeatedly overwriting special patterns in the files to be destroyed. In normal mode, 34 patterns are used (of which 8 are random); in quick mode, U.S. DoD (Department of Defence) 5200.28 standard are used with 7-pass wiping; and in custom mode, U.S. DoD 5200.28 standards are used with a user-defined number of passes.
A BestCrypt volume is accessible as a regular filesystem on a correspondent mount point. The data stored on a BestCrypt volume is stored in the container file. A container is a regular file or block device, so it is possible to backup, move, or copy it to other disk (CD-ROM or network, for instance) and continue to access encrypted data using BestCrypt. BestCrypt supports the following encryption algorithms: GOST in Cipher Feedback mode and BLOWFISH, DES, TWOFISH in Cipher Block Chaining mode. A container can be formatted for any filesystem supported by Linux (MINIX, EXT, EXT2, FAT, FAT32, and others) and mounted as an additional volume to any mount point.