My Account

Related categories 1

The Coroner's Toolkit (TCT) provides post-break-in data collection that could be useful in determining what happened. Less polished that the authors (Dan Farmer and Wietse Venema) usual work, the toolkit offers a patch-work of tools that help exhume interesting stuff from violated systems. Should be installed and examined before a break-in happens!
OpenPGP (RFC2440) implementation from the GNU project. Encrypts/decrypts/signs/digests files using strong cryptography. FAQ, downloads, documentation.
Tools such as tcpdump and traceroute.
Allows improved monitoring and alerting based on the contents of system logs.
lsof is a tool for examining I/O channels open on your Unix system. These can include files, FIFOs and network sockets. This information can be extremely useful for security and a variety of other purposes. Works on most Unix-like systems.
Unix system and security auditing tool.
A replacement for the Unix crypt, using several block algorithms in several modes like cbc, and cfb.
Efficient stealth port scanner. Downloads, e-mail lists, news.
Strong cryptographic software, libraries, and information about cryptography, data security, and privacy.
Open source implementation of SSH1 and SSH2 protocols. Ported from OpenBSD by the OpenSSH portability team.
The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, fully featured, and Open Source toolkit implementing the Secure Sockets Layer and Transport Layer Security protocols with full-strength cryptography world-wide.
Daemon implementing IDENT protocol, it can be used to identify the user who initiated a TCP/IP connection
Drop-in Sendmail replacement by Wietse Venema. Offers several features that make it difficult to crack.
(Security Administrator's Integrated Network Tool) Scans systems and networks and reports potential vulnerabilities.
Run selected commands as root, with the users' own password. Allows the administrator to grant limited root privileges to a subset of users, without giving out the root password.
Open source version of the original Unix file integrity scanner. Calculates and stores signatures of file permissions, ownership and contents. Scans the same files later, detecting changes. This open source version is targeted at Linux systems.
lsof is a tool for examining I/O channels open on your Unix system. These can include files, FIFOs and network sockets. This information can be extremely useful for security and a variety of other purposes. Works on most Unix-like systems.
(Security Administrator's Integrated Network Tool) Scans systems and networks and reports potential vulnerabilities.
Open source version of the original Unix file integrity scanner. Calculates and stores signatures of file permissions, ownership and contents. Scans the same files later, detecting changes. This open source version is targeted at Linux systems.
Unix system and security auditing tool.
Open source implementation of SSH1 and SSH2 protocols. Ported from OpenBSD by the OpenSSH portability team.
A replacement for the Unix crypt, using several block algorithms in several modes like cbc, and cfb.
Allows improved monitoring and alerting based on the contents of system logs.
The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, fully featured, and Open Source toolkit implementing the Secure Sockets Layer and Transport Layer Security protocols with full-strength cryptography world-wide.
Efficient stealth port scanner. Downloads, e-mail lists, news.
OpenPGP (RFC2440) implementation from the GNU project. Encrypts/decrypts/signs/digests files using strong cryptography. FAQ, downloads, documentation.
Daemon implementing IDENT protocol, it can be used to identify the user who initiated a TCP/IP connection
Strong cryptographic software, libraries, and information about cryptography, data security, and privacy.
The Coroner's Toolkit (TCT) provides post-break-in data collection that could be useful in determining what happened. Less polished that the authors (Dan Farmer and Wietse Venema) usual work, the toolkit offers a patch-work of tools that help exhume interesting stuff from violated systems. Should be installed and examined before a break-in happens!
Tools such as tcpdump and traceroute.
Run selected commands as root, with the users' own password. Allows the administrator to grant limited root privileges to a subset of users, without giving out the root password.
Drop-in Sendmail replacement by Wietse Venema. Offers several features that make it difficult to crack.
Last update:
February 9, 2019 at 19:57:21 UTC
Computers
Games
Health
Home
News