Ifchk is a network interface promiscuous mode detection tool that reports on the operational state of all configured interfaces present on the system. In addition, it will disable those interfaces found to be promiscuous if told to do so. Per-interface statistics can also be displayed, allowing administrators to perform traffic trend analysis, which could be an aid in the identification of possible inconsistencies or spikes in network traffic volume that may warrant further investigation.
d47ce9415527099c24ec20155c09bc95f6b268293fd545bd5c6eb0d8a30e975a
Ifchk is a network interface promiscuous mode detection tool that reports on the operational state of all configured interfaces present on the system. In addition, it will disable those interfaces found to be promiscuous if told to do so. Per-interface statistics can also be displayed, allowing administrators to perform traffic trend analysis, which could be an aid in the identification of possible inconsistencies or spikes in network traffic volume that may warrant further investigation.
94a86b57df925c74b1a5b9955b8844d13c666e34bcd266915a8d7858206c495b
Ifchk is a network interface promiscuous mode detection tool that reports on the operational state of all configured interfaces present on the system. In addition, it will disable those interfaces found to be promiscuous if told to do so. Per-interface statistics can also be displayed, allowing administrators to perform traffic trend analysis, which could be an aid in the identification of possible inconsistencies or spikes in network traffic volume that may warrant further investigation.
a12cb641290b2c83f598df89e91ebe5a4fada4b6fd008797fc0be41358edcdd4
Ifchk is a network interface promiscuous mode detection tool that reports on the operational state of all configured interfaces present on the system. In addition, it will disable those interfaces found to be promiscuous if told to do so. Per-interface statistics can also be displayed, allowing administrators to perform traffic trend analysis, which could be an aid in the identification of possible inconsistencies or spikes in network traffic volume that may warrant further investigation.
8e43bd3b37ee5bcdadaedc212ca897b1902bb0455ebf3464fd72deac8526b57e
Ifchk is a network interface promiscuous mode detection tool that reports on the operational state of all configured interfaces present on the system. In addition, it will disable those interfaces found to be promiscuous if told to do so. Per-interface statistics can also be displayed, allowing administrators to perform traffic trend analysis, which could be an aid in the identification of possible inconsistencies or spikes in network traffic volume that may warrant further investigation.
e6bc2af368b655d99e34562466fc8067cb348eedc6f6f60975ff2539ebeecb76
Ifchk is a network interface promiscuous mode detection tool that reports on the operational state of all configured interfaces present on the system. In addition, it will disable those interfaces found to be promiscuous if told to do so. Per-interface statistics can also be displayed, allowing administrators to perform traffic trend analysis, which could be an aid in the identification of possible inconsistencies or spikes in network traffic volume that may warrant further investigation.
972db3aa0cca5a41e4432bc9c3475cedbf89ac641971474928f4bfb8940ed4bc
Ifchk is a network interface promiscuous mode detection tool that reports on the operational state of all configured interfaces present on the system. In addition, it will disable those interfaces found to be promiscuous if told to do so. Per-interface statistics can also be displayed, allowing administrators to perform traffic trend analysis, which could be an aid in the identification of possible inconsistencies or spikes in network traffic volume that may warrant further investigation.
2ad7b74e2094b8b5670f0efbb77231515d92114cd814cc17d2fc90f2f9b2df84
Ifchk is a network interface promiscuous mode detection tool that reports on the operational state of all configured interfaces present on the system. In addition, it will disable those interfaces found to be promiscuous if told to do so. Per-interface statistics can also be displayed, allowing administrators to perform traffic trend analysis, which could be an aid in the identification of possible inconsistencies or spikes in network traffic volume that may warrant further investigation.
be6233788c5f551bb00d25f07e4c7322da322729d845d3e0614a9822f78f967a
Ifchk is a network interface promiscuous mode detection tool that reports on the operational state of all configured interfaces present on the system. In addition, it will disable those interfaces found to be promiscuous if told to do so. Per-interface statistics can also be displayed, allowing administrators to perform traffic trend analysis, which could be an aid in the identification of possible inconsistencies or spikes in network traffic volume that may warrant further investigation.
efd8383c76a727d0e3dcaf8f9052bac35e63e57cffd4cf95b9c56a94fc3ffe5d
Ifchk is a network interface promiscuous mode detection tool that reports on the operational state of all configured interfaces present on the system. In addition, it will disable those interfaces found to be promiscuous if told to do so. Per-interface statistics can also be displayed, allowing administrators to perform traffic trend analysis, which could be an aid in the identification of possible inconsistencies or spikes in network traffic volume that may warrant further investigation.
df3195a268465becabadb8bfa924d3a7c69a0f11e5c70b8be206eef0eb94988c
Ifchk is a network interface promiscuous mode detection tool that reports on the operational state of all configured interfaces present on the system. In addition, it will disable those interfaces found to be promiscuous if told to do so. Per-interface statistics can also be displayed, allowing administrators to perform traffic trend analysis, which could be an aid in the identification of possible inconsistencies or spikes in network traffic volume that may warrant further investigation.
3a46d086bc6d38af96da063d3b38b7f844b4115afb2246133f6ebfabfadecad8
portfwd is a small userlevel daemon which forwards incoming TCP connections or UDP packets to remote hosts. Multiple forwarders can be specified in a flexible configuration file. There is support for FTP forwarding and transparent proxy.
a880cf57ae00224c470c387cf2de8abbb53c4d761b4d67be5b0c9e15c3484066
agentsmith is a daemon that continuously monitors a log file for break-in attempts by remote hosts. Upon detection of a break-in attempt, it launches a user defined script or application, which can do virtually anything from sending mail messages to whatever else you might think of. The criteria for what is considered a break-in attempt can be configured by means of a regular expression.
38f56dbf017f6cb260c4abf55f422fe540e95a4058f589a88f6314183e1d8435
arpalert uses ARP address monitoring to help prevent unauthorized connections on the local network. If an illegal connection is detected, a program or script is launched, which could be used to send an alert message, for example.
d3166f0de57729902d84a61626794494c4eac80ee58241d07c813809328e62cd
agentsmith is a daemon that continuously monitors a log file for break-in attempts by remote hosts. Upon detection of a break-in attempt, it launches a user defined script or application, which can do virtually anything from sending mail messages to whatever else you might think of. The criteria for what is considered a break-in attempt can be configured by means of a regular expression.
2fd6257852996ba88a353a3c39ff46e2177ff75fa360a82dd7caeca82c528dc5
iCommander is a free and open source Command and Control Centre that lets you manage multiple servers from one place. The idea of iCommander is to provide an easy and secure solution for system administrators that allows them to control several servers from one place and in the same time.
73f3055a6a1ca8b5e80b3a19e36b165a9642add50ff7c81b5f9d42581cd2fc7e
iCommander is a free and open source Command and Control Centre that lets you manage multiple servers from one place. The idea of iCommander is to provide an easy and secure solution for system administrators that allows them to control several servers from one place and in the same time.
ffb48814b899ebddbe5c21e81828536d57266db2d7b5cfa67baa96fa22106201
iCommander is a free and open source Command and Control Centre that lets you manage multiple servers from one place. The idea of iCommander is to provide an easy and secure solution for system administrators that allows them to control several servers from one place and in the same time.
7be2331762400f819e69b2e768afe0786443a94e5e9e5393cc503e4a4a9ffa69
sshdautoban is a script intended to automatically ban, in real time, attackers that are trying to connect on your sshd service without authorization. It blocks connections from an IP address when it issues too many login errors.
92c99f11e9285e5115c53e480348cda76acf61d9201ab7ead7b580bd444ea898
Systrace enforces system call policies for applications by constraining the application's access to the system. The policy is generated interactively. Operations not covered by the policy raise an alarm, allowing the user to refine the currently configured policy. After a policy has been sufficiently constructed, further alarms often indicate security problems. Policies can also be generated automatically for sandboxing purposes.
d951979cdd23bed9d30de29a2e032ae5ea938d462ebe194bd5291873a8eff2ae
LockDown is an application that can be run interactively, non-interactively, or really-non-interactively to lock down a server that runs Red Hat, Fedora, CentOS, or similar systems. It sets things like umask and SGID/SUID, creates a simple firewall, and more.
bd5e27abaabd9e9495ec1c3d01878157918ff1542c6486638c4ef3f0e4c916f8
arpalert uses ARP address monitoring to help prevent unauthorized connections on the local network. If an illegal connection is detected, a program or script is launched, which could be used to send an alert message, for example.
81054ee1e1b964a20ad6a3d1093096e50c5a790d7b0a835c31883131199f6dfc
Systrace enforces system call policies for applications by constraining the application's access to the system. The policy is generated interactively. Operations not covered by the policy raise an alarm, allowing the user to refine the currently configured policy. After a policy has been sufficiently constructed, further alarms often indicate security problems. Policies can also be generated automatically for sandboxing purposes.
9e78877257749add3df4931f4b5bc202ae2724551e22146d28cc40440144f990
VisualRoute is a traceroute tool which displays a map of the path to the destination server by looking up the geographical location of each traceroute hop. The network service provider is identified for each hop, and instant domain and network whois information enable quick problem or abuse reporting.
c9d17a7f67cae41f50d27017851558479b06057e3bdf32ef910fd071cce29ddc
arpalert uses ARP address monitoring to help prevent unauthorized connections on the local network. If an illegal connection is detected, a program or script is launched, which could be used to send an alert message, for example.
1b0fb55cf593acdb19f00154afcd5cb12116602b98982dfac827112c8e26d4b8