Linux Trace Toolkit is a tool used to reconstruct the dynamic behavior of a linux system. LTT fills the gap left by tools such as gprof, strace, ps and many others when attempting to know what is going on with your linux system at every moment by providing it's user with all the information required to reconstruct a system's behavior during a certain period of time. One can know exactly the dynamics of a system. Why do certain synchronization problems occur? What exactly happens to an application when a packet is received for it? Overall, where do all the applications that I use pass their time? Where are the I/O latencies in a given application? etc. Requires kernel patch.
62c058b496848eb4487ce3a762be80f4829bc513c2c92b5356b3d2653e071fd5
ZetaMail 2.1 POP3/SMTP server is vulnerable to a buffer overflow caused by a long username / password. Binary / Source for the DoS exploit here.
05ab8f61d142aacfec12a6ab466acd75890a08dc2d75bd8809207b0e15a17a65
lids is an intrusion detection system patch for the Linux kernel; it can protect important files from being changed. When it's in effect, no one (including root) can change the protected files or directories and their sub-directories, and the protected append-only files can only be appended. It can also protect the hard disk's MBR, and can also disallow sniffing while the NIC is in promiscuous mode.
4f6f7925ca1f194d7d0c5f3f6c351e96fe52e41607c32e8906779badde1514b9
PSS gets "texts for newbies" by the bucketload. However, this is quite different. It has the "newbie hacking basics" presented in a tasteful and useful manner. Later, it goes into "novice/intermediate" tactics that many as piring (though not yet leet) hackers will find usefull. And finally, in sections such as Firewall Penetration experienced hackers will find valuable theroritical and practical tactics and techniques. All in all, Digital Voodoo is a great reference and resource for hacker and security specialist alike.
2b4e0acd7c6e89e30072ee3d3f99aab6d5fe8681f729269c134adc5d676f52de
Narrow Security Scanner is a perl script which checks for 177 remote vulnerabilities. Tested on Slackware 4.0, Red Hat (4.2, 5.0, 6.0), SuSE 6.1, FreeBSD 3.0 & OpenBSD 2.5.
957bdf614696996026ae4b75da6ff416b20c67a32a74a057df9ff5656ed3a6e1
Dragonmount Networks has released Part 1 of a multipart series on the Transmission Control Protocol. This first discussion is geared towards those new to the Internet who want an overview of the processes involved in client/server communications. A brief history of the Internet, discussion of ports, the 3-way handshake, and SEQ/ACK numbers are all included.
f3bcf352a2c27fc77330298259a54d48d655f8a17860eee8facd4fce4ee33641
XScreenSaver is a modular screen saver and locker for the X Window System. It is highly customizable and allows the use of any program that can draw on the root window as a display mode. More than 100 display modes are included in this package.
2fce3ff66937668106e28b2feab9d4a2f6fb72fb1b1e105818a2026174f56368