ClearEventLog is a freeware NT application that can clear the system, application, and security event logs via a simple command-line operation.
a080a54f583f5a2bc7b08daea2e6fe8f2352c517563b08887d67aab7e10e30d5
Anonymity Tutorial (In Spanish).
ae2dca7e900e253c36598876ed68e5e3e6908baa13ecc6e451b11e68b26ec391
Ad and Spam Blocking Tutorial (In Spanish).
535e665257f0b720a9f74534e97e035b9a93afbab504d1959ced8a8211bcb5ee
Proxies/Wingates/SOCKS Firewalls Tutorial (In German). Original by Jatt, translated /uebersetzt by I.RAM.S.
bb8b163d4cb8e2f941bbe2a4ad83ab2358daa09efbd8396e26418c18f4468442
The Eggdrop Bots Tutorial.
b55ec02f32787cf68bfbbaf6b87c9adfe2597cbbf7b0af47eb253ffd1ee6d7b7
Exploits Explained I: The New JavaScript Hole in Hotmail.
fefc92790c0e1f6582e99bee56576b24b1cdd804a4598c67b697503e22643fb8
Donald Dick: Sources of Client (command line) v1.53. Archive password is set to p4ssw0rd. Use at your own risk.
90c3eedafc87fbe2821752e54718b8ea655d8f3d35a57bcd4e1e208fdc4f07ac
Donald Dick: Client (command line) v1.53. Archive password is set to p4ssw0rd. Use at your own risk.
eb28c962092e6bd51f8007307c3f5c76574be51c089045ae310b53aabc7a0f79
Donald Dick: Client (GUI) v1.53. Archive password is set to p4ssw0rd. Use at your own risk.
b505df1e99a535c0a158e201eb3879265f66b2c903d8bfa3191b4704387d8925
Remote attackers can anonymously reconfigure any Hybrid Network's cable modem running HSMP.
fba4ceed238aa38474d25bcca294b76bebb7bd9fcfa00c44645e0dc301832253
Patch for rsbac-2.2.12-v1.0.9.tar.gz
e230c2a52b4633f8b109175032d84d8925c45803ccff71462e1fa99053057d02
Rule Set Based Access Control (RSBAC) is based on the Generalized Framework for Access Control (GFAC) by Abrams and LaPadula and provides a flexible system of access control based on several modules. All security relevant system calls are extended by security enforcement code. This code calls the central decision component, which in turn calls all active decision modules and generates a combined decision. This decision is then enforced by the system call extensions. Decisions are based on the type of access (request type), the access target and on the values of attributes attached to the subject calling and to the target to be accessed. Additional independent attributes can be used by individual modules, e.g. the privacy module (PM). All attributes are stored in fully protected directories, one on each mounted device. Thus changes to attributes require special system calls provided. As all types of access decisions are based on general decision requests, many different security policies can be implemented as a decision module. A general goal of RSBAC has been to some day reach (obsolete) Orange Book (TCSEC) B1 level. See also patch-2.2.12.gz.
09c33cf223972b4be79f592a45f18f242dfd40c155fac218ed7e1be314182e7f
Linux, in the tradition of UNIX-like operating systems, implements file system permissions using a rather coarse scheme. While this is sufficient for a surprisingly large set of applications, it is too inflexible for many advanced scenarios. For that reason, all the major commercial UNIX operating systems have extended this simple scheme in one way or the other. For Linux, such extensions are not stable enough yet. Standard distributions do not include ACLs so far.
c109f482790bea6fabc3915dcad8128d22aa967f47ef85004d19476c2e7f1ecd
Module to hide processes and files.
1dacfe7599201c72d4a5e36edbdc7611d0047682d8b6c3f2b694862f4e8fb406
Generic module hidder, for linux 2.2.x kernels. Hides the last module installed.
6a208911f56caefd20bec7fdb917d6c6e42897a877c76fb78c4b54558227d418
Module to retrieve privilege to processes.
3c1a53d2029af8aaf19ab04983497d4575d25c39406d48c1321172829309cb20
IPLimit is a security tool to prevent some denial of services on common internet daemons. It will dynamically reject connections from hosts thatalready connected too many times on the same service or the same server. And only these strobe makers will be rejected, not trusted people. IPLimit is fully configurable : you can, for instance, allow 40 connections per second for SMTP, and only 1 per minute for Telnet. It needs the TCPREMOTEIP and TCPLOCALPORT environment variables, so that IPLimit has to be used with a super-server like G2S or TCPServer. You can also use any other inetd variant if you have the tcp-env program (from Qmail). IPLimit was tested on Linux but should work on any other Unix implementation with or without minor changes.
9b0eb17b70cae3acbd2924d8bb3df048ceccc94275bad8e5a541747e0235eb3d
Buffer overflow in inews gives egid inews.
8bb19288490f427718791b2b774d580f8803ac2c4b7666e7abecaba1956b4039
"Anonymizing UNIX Tools v0.9" - Tools for securing your UNIX systems(s), keeping your data and actions as private as possible, as described in Anonymizing UNIX Systems v0.9 Whitepaper.
9a9cb9fff4b40791ac3df85ebeab0f860cc0aa06678868412878fda29e08ace9
Reverse-WWW-Tunnel-Backdoor version 1.6 - This backdoor should work through any firewall which has got the security policy to allow users to surf the WWW. Verified to work on Linux, Solaris, AIX and OpenBSD.
2dc02b8a40272350f1c66e2ee87bc8661f905a84b84f532a3a2dc4cd1167027c
I found the security vulnerability in canumm Japanese Kana-Kanji FEP. This program is installed on Turbolinux series with default. /usr/jp/canna/bin/canuum is a suid program. It overflows if the long argment is specified with many kind of options such as -k, -c, -n. I coded an exploit for the Linux, the local user can obtain a root privilege.
541df7e6ab602ad5a839835c476c08199b3ad305b9c2ab1b0611a680b6196c18