RSS 14 projects tagged "Security"

No download Website Updated 30 Jan 2001 Aduva Manager

Screenshot
Pop 70.63
Vit 1.42

Aduva Manager is a package manager with automatic download and dependency checking, system sanity checking, a package security updater, kernel compilation/installation, and a hardware plug-and-play installer for RH6.x boxes.

Download Website Updated 20 May 2008 PIKT

Screenshot
Pop 146.65
Vit 14.72

PIKT is cross-categorical, multi-purpose software for monitoring and configuring computer systems, administering networks, organizing system security, and much more. PIKT is intended primarily for system monitoring, and secondarily for configuration management, but its versatility and extensibility evoke many other wide-ranging uses. PIKT consists of a sophisticated, feature-rich file preprocessor; an innovative scripting language with unique labor-saving features; a flexible, centrally directed process scheduler; a customizing file installer; a collection of powerful command-line extensions; and other useful tools.

Download Website Updated 22 May 2005 TrinityOS

Screenshot
Pop 381.95
Vit 4.48

TrinityOS is a step-by-step, example-driven HOWTO on building a very functional Linux box with strong security in mind. TrinityOS is well known for its strong packet firewall ruleset, Chrooted and Split DNS (v9 and v8), secured Sendmail (8.x), Linux PPTP, Serial consoles and Reverse TELNET, DHCPd, SSHd, UPSes, system performance tuning, the automated TrinityOS-Security implementation scripts, and much more.

Download Website Updated 27 Oct 2003 scponly

Screenshot
Pop 144.52
Vit 3.17

scponly is an alternative "shell" of sorts for system administrators who would like to provide access to remote users to both read and write local files without providing any remote execution priviledges. Functionally, it is a wrapper around the ssh suite of applications. It is typically used by creating a user whose shell is set to scponly. This user can neither login interactively nor execute commands remotely, but it can use scp and sftp to download and upload files to the computer, governed by the usual Unix file permissions.

No download Website Updated 01 May 2001 Portable Linux Auditing CD

Screenshot
Pop 48.52
Vit 68.86

PLAC is a business card sized bootable cdrom running linux. It has network auditing, disk recovery, and forensic analysis tools.

Download Website Updated 22 May 2005 IP Masquerade HOWTO

Screenshot
Pop 113.01
Vit 3.15

The IP Masquerade HOWTO is the document that contains instructions on understanding, configuring, and troubleshooting NAT or Network Address Translation for Linux. It covers topics such as IPTABLES, PORTFW, IPCHAINS, IPFWADM, stronger packet firewalls, multiple network segments, and configuring many client operating systems. It also has an extensive FAQ and troubleshooting section.

No download Website Updated 24 Jan 2010 Wiresoft ANA

Screenshot
Pop 59.50
Vit 1.00

Wiresoft ANA (Automated Network Agent), an Artificial Intelligence-based systems management service, automatically performs over 90% of Linux systems management tasks. It is a self-managing, self-learning system support service that provides constant maintenance and protection for Firegate Servers. ANA services include Software Updating and Integration, Intrusion Detection, Data Back-up and Disaster Recovery, Monitoring, and Alerting.

Download Website Updated 14 Jan 2008 radmind

Screenshot
Pop 172.23
Vit 7.03

radmind is a suite of Unix command-line tools and a server designed to remotely administer the file systems of multiple Unix machines. At its core, radmind operates as a tripwire. It is able to detect changes to any managed filesystem object, e.g. files, directories, links, etc. However, radmind goes further than just integrity checking: once a change is detected, radmind can optionally reverse the change. Each managed machine may have its own loadset composed of multiple, layered overloads. This allows, for example, the operating system to be described separately from applications. Loadsets are stored on a remote server. By updating a loadset on the server, changes can be pushed to managed machines.

Download Website Updated 30 May 2003 Access Control Designer

Screenshot
Pop 47.29
Vit 1.00

Access Control Designer is a universal modular tool for visually designing access control policies. The user of this system depicts requirements for the designed security policy in a graphical notation based on a generally accepted security model. The tool will then generate a configuration of security mechanisms, which will be used for the implementation of the security policy. Modularity of the tool will allow users to design security policies for a lot of various environments - systems needed to have access controlled. A pluggable module API allows third-party programmers to provide ACD modules for systems and so allow users to use ACD for designing access control policies for the systems.

Download Website Updated 23 Dec 2003 Injector Linux

Screenshot
Pop 60.46
Vit 1.00

Injector Linux is a single-floppy Linux system, which supports many filesystems -- currently approximately 25. Because of its wide range of supported filesystems, it is very useful for disk rescue operations.

Screenshot

Project Spotlight

GunsPHP

An event-based JavaScript embedded PHP framework.

Screenshot

Project Spotlight

Adagios

A Web-based Nagios configuration interface.