Software Index
Linux Software Security Tools  

Security Tools

Records 61-80 of 251  |  Go to << Prior 1 2 3 4 5 6 7 8 ... 13 Next >> page 
Product Title  /  Popularity Revised  License Rating Size
md5sha1sum project provides md5sum, sha1sum, and ripemd160sum. They are intended to be drop in replacements for the tools from GNU textutils.

Since installing textutils is somewhat excessive for just those two utilities, these are meant to be the more compact and ...
September 22nd 2011 Freeware    10k
jsfirewall increases the safety for the desktop PC with one network card.

The program is quickly administrated and it is easy to generate an iptables based firewall script.

It has no ROUTER function, but is a personal firewall and it is developed ...
September 22nd 2011 Freeware    31k
VirusBuster Antivirus home solutions for Linux
The VirusBuster for Linux package includes both the VirusBuster Shield and VirusBuster Scan Daemon applications. The latter provides the VirusBuster scan engine interface for the Shield.

Resident protection
Continuous, resident protection, which works in the background without affecting the every-day work, ...
September 19th 2011 Freeware    19,425k
Covert Channels Evaluation Framework
Covert Channels Evaluation Framework (CCHEF) is a software framework for empirically evaluating covert channels in network protocols running under Linux.

Using encryption is not sufficient to secure communication because the simple fact that communication exists is often enough to raise suspicion ...
September 19th 2011 Freeware    543k
Graudit is a little script and signature sets that allows you to find potential security flaws in source code using the GNU utility grep. It's comparable to other static analysis applications like RATS, SWAAT and flaw-finder while keeping the technical ...
September 17th 2011 Freeware    20k
Cmos password recovery tools
Cmos password recovery tools decrypts password stored in cmos used to access BIOS SETUP.. . Publisher of Cmos password recovery tools, Author of Cmos password recovery tools 4.8. Cmos password recovery tools decrypts password stored in cmos used to access ...
September 14th 2011 Freeware    31k
mounttruecrypt is a command-line utility to mount truecrypt devices through a symlink target (e.g. created with udev).

You can e.g. use this script for RUN in the udev definitions.. Wie ich die Welt sehe.
September 13th 2011 Freeware    215k
pam_unix2 PAM module is for traditional password authentication.

Here are some key features of "pam unix2":

? Allows global configuration file for all options
? Can get passwords from secure NIS+ servers
? Sets secureRPC credentials
? Supports HP-UX password aging.
? Support of passwords with ...
September 12th 2011 Freeware    195k
yaSSH project is a fast, dual-licensed implementation of SSH.

It will include an SSH client, a client library, a server, and a server library.

It is focused on speed, limited memory requirements, a simple API, portability, and use in an embedded setting.. ...
September 12th 2011 Freeware    348k
KPSAD is a simple shell script to report PSAD alerts via KDE. The project supports simple whitelisting.

Ok, this is important. To stop KPSAD annoying you, create a whitelist file!!! The whitelist file is named ".whitelist" in the same directory as ...
September 12th 2011 Freeware    31k
VirusBuster Scanners for FreeBSD
The VirusBuster Scanners are sometimes the only solution for a critical problem. Because of its size and the several supported platforms, the command line scanner is a truly effective tool for finding and removing virus infections.

Their main task is to ...
September 10th 2011 Free Trial    19,261k
dm-crypt is a device-mapper crypto target.

Device-mapper is a new infrastructure in the Linux 2.6 kernel that provides a generic way to create virtual layers of block devices that can do different things on top of real block devices like striping, ...
September 10th 2011 Freeware    246k
Md4sum generates or checks MD4 checksums applying the algorithm specified in RFC 1320. The project role is to generate and print checksums for all files passed as arguments.. .
September 10th 2011 Freeware    31k
Password List Generator
Password List Generator is a good tool to create passwords list with makepasswd and save to file.. Applications for your KDE-Desktop - Applications for your KDE-Desktop - Community Portal for KDE Applications Software Office Multimedia Graphic Network Printing ...
September 9th 2011 Freeware    31k
SSH Rootkit
SSH Rootkit is a patch for latest version of SSH 1.2 to enable "rootkit" features like incoming/outgoing password logging, "global password" to allow login into any account using a pre-defined password.

Adds options to SSH configure script to enable rootkit features. ...
September 7th 2011 Freeware    10k
onepad is a set of programs to encrypt files using one-time-pad encryption. This is an old but theoretically impossible to easily break way of encryption. I came across this method in Neal Stephenson's Cryptonomicon.

It works by XOR-ing every byte in ...
September 7th 2011 Freeware    10k
Zeppoo makes it possible to detect if a rootkit is installed on your system.

Zeppoo also makes it possible to detect hidden tasks, syscalls, some corrupted symbols, modules, and also hidden connections.

For that, it mainly uses /dev/kmem to directly inspect the ...
September 6th 2011 Freeware    31k
vsftpd-deny is a simple Python script to search through vsftpd log, searching for connection attempts (FAIL LOGIN, possible attack). When client goes over the defined threshold, it's added to hosts.deny.

At this stage of development, the script adds new IPs permanently. ...
September 4th 2011 Freeware    10k
MynahSA is a cross-platform toolkit for connecting C++ objects to data streams. Developers using MynahSA can quickly and easily create client/server applications or encrypted files containing serialized object data.

The toolkit uses OpenSSL for encryption and secure network communications. MynahSA is ...
September 3rd 2011 Freeware    881k
Password Gorilla
Password Gorilla is a password manager that stores your login information, sorted by groups, in a blowfish-encrypted file, protected by a master password.

Many internet services require you to "log in." You choose a user name and a password, in combination ...
September 2nd 2011 Freeware    184k
New Software
Popular Software
Latest Reviews