1971 projects tagged "Security"

Download Website Updated 30 Jan 2001 AVAcl

Screenshot
Pop 28.35
Vit 1.00

AVAcl is intended to be called from within AV scanning scripts such as Inflex and AMaViS, to provide an ACL type facility such that adminitrators can provide finer control over their file type/name/content/email blocking.

Download Website Updated 30 May 2003 Access Control Designer

Screenshot
Pop 46.03
Vit 1.00

Access Control Designer is a universal modular tool for visually designing access control policies. The user of this system depicts requirements for the designed security policy in a graphical notation based on a generally accepted security model. The tool will then generate a configuration of security mechanisms, which will be used for the implementation of the security policy. Modularity of the tool will allow users to design security policies for a lot of various environments - systems needed to have access controlled. A pluggable module API allows third-party programmers to provide ACD modules for systems and so allow users to use ACD for designing access control policies for the systems.

Download Website Updated 28 Mar 2006 Access Point Utilities for Unix

Screenshot
Pop 192.68
Vit 7.54

Access Point Utilities for Unix is a set of utilities that configure and monitor a Wireless Access Point under Unix. It is known to compile (with GCC and the IBM C compiler) and run under Linux, FreeBSD, OpenBSD, MacOS X, AIX, and QNX.

Download No website Updated 04 Jun 2013 Access Road

Screenshot
Pop 113.74
Vit 10.43

Access Road is a universal simulator of access controls that is intended to improve design and auditing of IT security. It provides simulations of GNU/Linux (components and rights on the file system), MySQL Server (components and privileges), and a generic Role-Based-Access-Control application. It is designed for database, system, and application administrators, IT architects and developers, and auditors. Reliability and the ability to explain the results are the main objectives. Tutorials of 80 pages are provided. A powerful framework allows new simulations to be added.

Download Website Updated 01 Sep 2005 Accessfs

Screenshot
Pop 39.94
Vit 1.93

Accessfs is a file system to manage permissions. It is not very useful on its own. You need to load other modules like "User permission based IP ports" or "User permission based capabilities". With these modules there's no need anymore for most Internet daemons to run as root.

Download Website Updated 17 Nov 2002 Account Services Manager

Screenshot
Pop 115.93
Vit 3.12

The Account Services Manager allows Web hosting companies to easily automate the time consuming tasks of managing mail, FTP accounts, and more by giving the power to individual clients via a Web-based interface.

No download Website Updated 02 Mar 2004 Adamantix

Screenshot
Pop 112.57
Vit 3.14

The Adamantix project (formerly known as Trusted Debian) aims to create a highly secure but usable Linux platform. It brings together security solutions including kernel patches, compiler patches, security related programs, and techniques.

Download Website Updated 11 Nov 2004 Adams State College Authenticator

Screenshot
Pop 29.39
Vit 1.74

ASCA (Adams State College Authenticator) is designed to provide single-sign-on session management to a variety of Web services accessed via a Web portal environment for Adams State College. Services that can be used with the library include SCT Banner Web, Squirrel Mail, WebCT, and Novell Groupwise.

Download Website Updated 23 Feb 2007 Adder

Screenshot
Pop 14.04
Vit 1.00

The Adder voting system is an Internet-based electronic voting system. It allows both large-scale and small-scale elections, and provides strong cryptographic mechanisms to ensure the privacy and integrity of elections.

Download Website Updated 26 Jul 2001 Adeos Filesystem Security Scanner

Screenshot
Pop 24.90
Vit 68.63

Adeos Filesystem Security Scanner is an automated filesystem security scanner. It recursively walks all mounted filesystems on the local system, and attempts to identify common security concerns, such as SUID, and world-writeable files. The output is available as text or HTML, with either output type formatted in either report or list style. Text is written to stdout and may be redirected to a file, while HTML is written to a file named results.html in the local directory.

Screenshot

Project Spotlight

P-rout

A tool for collecting and viewing data from a Nedap PowerRouter.

Screenshot

Project Spotlight

Ingo

A mail filtering manager, supporting Sieve, procmail, maildrop and IMAP filters.