Astaro Portscan Detection is a netfilter target which will attempt to detect TCP and UDP port scans and log them to syslog. This target is based upon Solar Designer's scanlogd. It suppports mutliple levels of logging, custom prefixes for entries, weighted total port scan detection, and port scan temporal spread detection.
Astaro Security Gateway (formerly Astaro Security Linux) is an all-in-one network security gateway that includes a firewall, intrusion protection, antivirus, spam protection, URL filtering, and a VPN gateway. Features include a modern packet filter, intrusion detection and prevention, portscan detection, application control, content filtering, virus detection for email and Web traffic, profile handling, L2TP, IPSec, SSL, and PPTP VPN tunneling, spam blocking, proxies for HTTPS, HTTP, FTP, POP3, SMTP, DNS, VoIP, SOCKS, and Ident, logging, and reporting. It supports Ethernet, VLAN, PPP, PPPoE, PPPoA, Cable Modem, IPv6, QoS, Link Aggregation, and WAN-Uplink-Load balancing in routing, and bridge mode. The WebAdmin GUI, Install Wizard, Change Tracking, Printable Configuration, and Up2Date service make it easy to install, manage, and maintain.
audio-entropyd feeds the /dev/random device with entropy data read from an audio device. The audio data is not copied as is, but first 'de-biased' and analyzed to determine how many bits of entropy are in it. This program is useful for systems doing many cryptographic tasks like VPN endpoints or GPG clients; it helps prevent the /dev/random device from being depleted and blocking reads.
Authforce is an HTTP authentication brute forcer. Using various methods, it attempts brute force username and password pairs for a site. It has the ability to try common usernames and passwords, username derivations, and common username/password pairs. It is used both to test the security of your site and to highlight the insecurity of HTTP authentication due to the fact that users just don't pick good passwords.
Automated Password Generator is a set of tools for random password generation including a standalone password generator, an RFC972 password generation server, and a Perl client for the password generation server. These feature a built-in X9.17 random number generator, and 35 modes of password generation, including pronounceable password generation.
Bastille Unix (formerly Bastille Linux) aims to be the most comprehensive, flexible, and educational Security Hardening Program for Red Hat (Fedora Core, Enterprise Linux, and original Red Hat), SuSE, Gentoo, Mandrake, and Debian Linux, as well as HP-UX and Mac OS X. Virtually every task it performs is optional, providing immense flexibility. It educates the installing admin regarding the topic at hand before asking any question. The interactive nature allows the program to be more thorough when securing, while the educational component produces an admin who is less likely to compromise the increased security.
BCWipe securely erases data from magnetic and solid-state memory, by repeatedly overwriting special patterns in the files to be destroyed. In normal mode, 34 patterns are used (of which 8 are random); in quick mode, U.S. DoD (Department of Defence) 5200.28 standard are used with 7-pass wiping; and in custom mode, U.S. DoD 5200.28 standards are used with a user-defined number of passes.
BeeCrypt is an ongoing project to provide strong and fast cryptography in the form of a toolkit usable by commercial and open source projects. Included in the library are entropy sources, random generators, block ciphers, hash functions, message authentication codes, multiprecision integer routines, and public key primitives.
A BestCrypt volume is accessible as a regular filesystem on a correspondent mount point. The data stored on a BestCrypt volume is stored in the container file. A container is a regular file or block device, so it is possible to backup, move, or copy it to other disk (CD-ROM or network, for instance) and continue to access encrypted data using BestCrypt. BestCrypt supports the following encryption algorithms: GOST in Cipher Feedback mode and BLOWFISH, DES, TWOFISH in Cipher Block Chaining mode. A container can be formatted for any filesystem supported by Linux (MINIX, EXT, EXT2, FAT, FAT32, and others) and mounted as an additional volume to any mount point.