Software Index
Linux Software Security Tools  

T-BEAR

download download home home   report broken
important software information
company name:
Josh D.
license: Freeware
minimum requirements: No special requirements.
functional limitations:
T-BEAR description
T-BEAR is the Transient Bluetooth Environment security AuditoR. It includes an ncurses-based BT scanner, a Bluetooth DoS proof-of-concept, and a "hidden" BDADDR hunter similar to Redfang 2.5.. . transient-iss.com
Similar software
Panda TruPrevent Corporate (Popularity: ) : If you have an antivirus solution developed by any manufacturer other than Panda Software, TruPrevent Corporate is the perfect complement to reinforce the security of your corporate network.
TruPrevent Corporate acts as a second layer of defense, preventing the propagation ...

Tracks Free (Popularity: ) : When you work on your computer and browse the Internet, you leave behind traces of your activity. In addition, Windows and the programs you use store many files in many places that aren't obvious. These unnecessary files occupy space on ...
zeroer (Popularity: ) : zeroer utility can be used to flush the empty space on a disk. In contrary to the dd utility, zeroer doesn't wipe existing files on a partition. zeroer overwrites the unallocated disk space around existing files, which means that deleted ...
Snort (Popularity: ) : Snort project is a "lightweight" intrusion detection technology in comparison to commercially available systems.

Snort really isn't very hard to use, but there are a lot of command line options to play with, and it's not always obvious which ones go ...

Seahorse (Popularity: ) : Seahorse is a GNOME application for managing PGP keys. Seahorse project also integrates with nautilus, gedit and other places for encryption, decryption and other operations. Seahorse is based on GPG and GPGME.

Seahorse 2.0 will provide a consistent encryption system throughout ...

Ruby Crypt (Popularity: ) : Ruby Crypt library is a pure-ruby implementation of a number of popular encryption algorithms. Block cyphers currently available include Blowfish, GOST, IDEA, and Rijndael (AES). Cypher Block Chaining (CBC) has been implemented. Twofish, Serpent, and CAST256 are planned for release ...
Covert Channels Evaluation Framework (Popularity: ) : Covert Channels Evaluation Framework (CCHEF) is a software framework for empirically evaluating covert channels in network protocols running under Linux.

Using encryption is not sufficient to secure communication because the simple fact that communication exists is often enough to raise suspicion ...

Clam AntiVirus (Popularity: ) : Clam AntiVirus is an anti-virus toolkit for Unix. Clam AntiVirus main purpose is the integration with mail servers (attachment scanning).

The package provides a flexible and scalable multi-threaded daemon, a commandline scanner, and a tool for automatic updating via Internet. The ...

Coinflip (Popularity: ) : Coinflip provides a cryptographically secure server/client program and protocol for choosing random bits.

Coinflip is a client/server based program that can generate random bits for 2 people over the internet. The 2 people don't have to trust each other in order ...

Copernicus (Popularity: ) : Copernicus provides a program for remembering usernames and passwords.

It enables you to store all your various Internet login details in one convenient location. It is easy to use, free, cross-platform, and available in more than ten different languages.

Copernicus is a ...

THC-SecureDelete (Popularity: ) : THC-SecureDelete is the best secure data deletion toolkit! If you overwrite a file for 10+ times, it can still be recovered. Read why and use the programs included (w/src!).

These tools can wipe files, free disk space, swap and memory! Changes: ...

Truecrypt mount/unmount scripts (Popularity: ) : Truecrypt mount/unmount scripts contains two .sh files for mounting and unmounting truecrypt partitions with some dialogues. When mounting a password is asked and when unmounting both normal and forced mounting is supported, asking the user what to do in each ...
User reviews

Write a review:
1 2 3 4 5 6 7 8 9 10
1=poor 10=excellent
Write review*
Your name*
Email*
  (Comments are moderated, and will not appear on this site until the editor has approved them)
 
Similar scripts
T-Shirt Designer Script (Popularity: ) : T-Shirt Designer is the result of intense research and thoughtful design from our world-class designers and engineers. We don't cut corners, we don't outsource, and we don't give excuses. Our attention to detail and renowned Swiss work ethic translate to ...
t-SQL Code Analyzer (Popularity: ) : t-SQL Code Analyzer aims at writing a shallow parser in Ruby for t-SQL (Microsoft's version of procedural SQL) which reports the database tables and columns used in the query.
Bear SQL for Scripts (Popularity: ) : It aims to make managing your database easy. If you're someone with no SQL skills or just want to get the job done simply and easily, Bear SQL is for you.The script assumes that the provided MySQL username has the ...
C T S Classad 3.0 (Popularity: ) : C T S Classad 3.0 is a multi-platform compatible script that helps you with your classified ads (PHP4/MySQL) Unlimited number of ads, categories and subcategories, user management, ad edit by Administrator and user, free field definitions, Multilingual, Administrator release of ...
D.t. - The Underground Informant (Popularity: ) : D.t. - The Underground Informant is multi-platform compatible. D.T. is the web's most uberleet and feature-rich newsletter management system. Speed, style and complete template-based customization allows you to change almost any aspect of the script's look and feel. It also ...
Forgot password! Don't worry (Popularity: ) : Forgot password! Don't worry is an utility which will be helpful for the webmasters to send the forgotten passwords of the site visitors through email. In this article author offers various codes to remind the users password by sending them ...
Form Validation with ASP.NET - It Doesn't Get Any Easier! (Popularity: ) : Form Validation with ASP.NET - It Doesn't Get Any Easier! is a web based tutorial in which author concentrates on validating the web form using validator control. The author elaborates about method of using regular form validator, range validator and ...
Network Programming with Perl (Popularity: ) : "Network programming"--the term had a distinct meaning once, but now it begs the question, "Is there another kind?" That's why Lincoln Stein's Network Programming with Perl is valuable. It shows how one of the world's top Perl authorities brings the ...
Rerserved Database Keywords for Access, ODBC and T-SQL keywords (Popularity: ) : Reserved Database Keywords is an ASP.NET reference with hundreds of reserved words that should not be used in the user defined objects, names of tables and columns of Access, ODBC and T-SQL databases. If the users use these words unknowingly ...
Safe-T-Lock Lite (Popularity: ) : Safe-T-Lock Lite is a FREE evaluation version of our Safe-T-Lock Pro software. Just like its elder sibling, Safe-T-Lock Lite is a PayPal IPN processing script that securely delivers a product via email. Your product remains safe within a .htaccess-protected directory, ...
Rate me
supported os's
stats
downloads 18
version 1.5.1
size in Kb 174
popularity   
925/1272475
user rating 0/10
our rating 0 Stars
share info
Recommend T-BEAR
Report spyware
New Software
Popular Software
Latest Reviews