RSS 43 projects tagged "Systems Administration"

Download Website Updated 24 Sep 2001 securitylog2html

Screenshot
Pop 16.31
Vit 67.72

Securitylog2html is a script developed in AWK for filtering ipchains logs to generate HTML reports.

Download Website Updated 14 Dec 2001 qmail-masq-user

Screenshot
Pop 15.97
Vit 67.12

Originally based off the program qmail-masq, qmail-masq-user uses qmail and qmail-qfilter to change the From: address of outgoing emails to almost any combination of username, domain, or both. The configuration allows you to specify domain catch-alls, user catch-alls, email catch-alls, specific combinations of users and/or domains, and much more.

Download Website Updated 19 Jun 2009 dnsbl-milter

Screenshot
Pop 19.08
Vit 48.32

dnsbl-milter is a lightweight and flexible Sendmail DNSBL and DNSWL mail filter (milter). dnsbl-milter consults a set of DNS black lists and white lists to determine if messages from particular hosts should be accepted.

Download No website Updated 19 Jun 2009 lclamav-milter

Screenshot
Pop 14.00
Vit 47.40

lclamav-milter is a small and lightweight Sendmail Clam AntiVirus mail filter (milter). lclamav-milter scans messages for viruses and worms, accepts clean messages, rejects the bad, and helps stop the spread of email viruses and worms.

Download Website Updated 29 Oct 2011 DynaStop

Screenshot
Pop 78.49
Vit 30.72

DynaStop is a utility to examine IPv4 based addresses for Exim and procmail for the purpose of filtering based upon patterns defined by the administrator. This can be a pivotal factor in email filtering and server load management, since dynamic IP addresses are typically used for dial-up, DHCP, and DSL accounts. All of which have a designated mail exchange server through which all outbound mail flows as defined with many, if not most, large Internet service providers.

Download Website Updated 30 May 2013 John the Ripper

Screenshot
Pop 1,489.52
Vit 27.11

John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, lots of other hashes and ciphers are added in the community-enhanced version (-jumbo), and some are added in John the Ripper Pro.

Download Website Updated 21 Jan 2006 Email Security through Procmail

Screenshot
Pop 166.16
Vit 8.67

Email Security through Procmail (the Procmail Sanitizer) provides methods to sanitize email, removing obvious exploit attempts and disabling the channels through which exploits are delivered. Facilities for detecting and blocking Trojan Horse exploits and worms are also provided.

No download Website Updated 17 Sep 2007 MailStripper Pro

Screenshot
Pop 81.99
Vit 7.29

MailStripper Pro is a mail scanner that aims to remove spam and viruses from incoming mail. It recognises and decodes many obfuscation techniques used by spammers and uses several different mechanisms to recognise spam which are immune to Bayes poisoning, and has achieved real-world success of over 99.8%. It is MTA-independent and does not implant itself into your mail server. Instead, it functions as a proxy, allowing the MTA to reside on a different server.

Download Website Updated 02 Mar 2006 Logrep

Screenshot
Pop 198.42
Vit 5.97

Logrep is a secure multi-platform tool for the collection, extraction, and presentation of information from various log files. It features HTML reports, multi-dimensional analysis, overview pages, SSH communication, and graphs, and supports 25 popular systems including Snort, Squid, Postfix, Apache, Sendmail, syslog, iptables/ipchains, xferlog, NT event logs, Firewall-1, wtmp, Oracle listener, and Pix.

Download Website Updated 17 Apr 2012 mail2sh

Screenshot
Pop 74.88
Vit 4.82

Mail2sh makes it possible to carry out shell commands by email. Email is sent to a particular user on your host and the commands will be carried out if the user and password given matches ones in /etc/passwd. Commands are executed with the user's privileges, and combined with a PGP module ensures a certain level of security for use. Note that the system is not natively encrypted, so use of an encryption mechanism is highly recommended for security reasons.

Screenshot

Project Spotlight

TaskManager

A Perl/Tk application to manage a ToDo list.

Screenshot

Project Spotlight

Kobold's Quest 1

An RPG wizard adventuring game.