RSS 269 projects tagged "Systems Administration"

No download Website Updated 30 Jan 2001 Aduva Manager

Screenshot
Pop 70.42
Vit 1.42

Aduva Manager is a package manager with automatic download and dependency checking, system sanity checking, a package security updater, kernel compilation/installation, and a hardware plug-and-play installer for RH6.x boxes.

Download Website Updated 01 Sep 2003 Automated Password Generator

Screenshot
Pop 313.93
Vit 5.43

Automated Password Generator is a set of tools for random password generation including a standalone password generator, an RFC972 password generation server, and a Perl client for the password generation server. These feature a built-in X9.17 random number generator, and 35 modes of password generation, including pronounceable password generation.

No download Website Updated 30 Jan 2012 Bastille Linux / Unix

Screenshot
Pop 391.73
Vit 14.92

Bastille Unix (formerly Bastille Linux) aims to be the most comprehensive, flexible, and educational Security Hardening Program for Red Hat (Fedora Core, Enterprise Linux, and original Red Hat), SuSE, Gentoo, Mandrake, and Debian Linux, as well as HP-UX and Mac OS X. Virtually every task it performs is optional, providing immense flexibility. It educates the installing admin regarding the topic at hand before asking any question. The interactive nature allows the program to be more thorough when securing, while the educational component produces an admin who is less likely to compromise the increased security.

Download Website Updated 05 Jan 2004 Big Brother

Screenshot
Pop 245.52
Vit 7.09

Big Brother is a combination of monitoring methods. Unlike SNMP where information is just collected and devices polled, Big Brother is designed in such a way that each local system broadcasts its own information to a central location. Simultaneously, Big Brother also polls all networked systems from a central location. This creates a highly efficient and redundant method for proactive network monitoring.

Download Website Updated 30 Jan 2001 boclient

Screenshot
Pop 26.27
Vit 1.74

boclient is a remote windows administation tool which uses BackOrifice or NetBus servers on Windows. It is an improvement of version 1.21. Most recent versions have GNU readline support, NetBus commands, portability to other platforms (BeOS, QNX and 64bit architectures like Alpha) and async network I/O.

Download Website Updated 12 Apr 2002 cotty

Screenshot
Pop 15.72
Vit 1.83

cotty is a simple command-line tool to manage pseudo-terminals. It allows users to run processes communicating with each other through their tty as opposed to files, pipes, or sockets. Its main use is to build a VPN (virtual private network) or conversely pierce a firewall.

Download Website Updated 13 Jun 2010 daemon

Screenshot
Pop 132.89
Vit 5.32

daemon turns other processes into daemons. There are many tedious tasks that need to be performed to correctly set up a daemon process; daemon performs these tasks for other processes. This is useful for writing daemons in languages other than C, C++, or Perl (e.g. sh, Java). If you want to write daemons in languages that can link against C functions (e.g. C, C++), see libslack, which contains the core functionality of daemon.

Download Website Updated 20 Sep 2005 DNSSEC Walker

Screenshot
Pop 83.57
Vit 3.94

DNSSEC Walker is a tool to recover DNS zonefiles using the DNS protocol. The server does not have to support zonetransfer, but the zone must contain DNSSEC "NXT" or "NSEC" records. Optionally, it can also verify DNSSEC signatures on the RRsets within the zone.

Download Website Updated 21 Jan 2006 Email Security through Procmail

Screenshot
Pop 162.45
Vit 8.66

Email Security through Procmail (the Procmail Sanitizer) provides methods to sanitize email, removing obvious exploit attempts and disabling the channels through which exploits are delivered. Facilities for detecting and blocking Trojan Horse exploits and worms are also provided.

No download Website Updated 10 Mar 2002 Extended Attributes and ACLs for Linux

Screenshot
Pop 109.60
Vit 3.47

Linux, in the tradition of UNIX-like operating systems, implements file system permissions using a rather coarse scheme. While this is sufficient for a surprisingly large set of applications, it is too inflexible for many other scenarios. For that reason, all the major commercial UNIX operating systems have extended this simple scheme in one way or the other. This is an effort to implement POSIX-like Access Control Lists for Linux. Access Control Lists are built on top of Extended Attributes, which can also be used to associate other pieces of information with files such as Filesystem Capabilities, or user data like mime type and search keywords.

Screenshot

Project Spotlight

Adagios

A Web-based Nagios configuration interface.

Screenshot

Project Spotlight

MathGL

A library for making high-quality scientific graphics.