exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2000-08-07

saint-2.1.2.tar.gz
Posted Aug 7, 2000
Site wwdsi.com

SAINT (Security Administrator's Integrated Network Tool) is a security assesment tool based on SATAN. It is updated regularly and scans for just about all remotely detectable vulnerabilities. Features include scanning through a firewall, updated security checks from CERT & CIAC bulletins, 4 levels of severity (red, yellow, brown, & green) and a feature rich HTML interface.

Changes: This version includes all of the vulnerability checks introduced in beta 1, plus checks for O'Reilly Website pro and BEA Weblogic servers, and a fix for the Cold Fusion false positive bug.
tags | tool, scanner, vulnerability
systems | unix
SHA-256 | e3417540cb7b585313abf432ccd7963f3f7b75713cc2941efc9f0e78a49287bc
linux-security.1-15.txt
Posted Aug 7, 2000
Authored by Benjamin Thomas | Site linuxsecurity.com

Linux Security Week August 7 - In this issue: Advisories for mailman, netscape, cvsweb, kon2, and pam_console. Of these, remote root vulnerabilities are present in cvsweb and kon2. Also includes a feature article on the US and UK governments wanting to install a device on public networks to monitor traffic for suspected criminal activity, Interivew with Jasta: coder of Gnapster, Discussion of "Linux Sux Redux" Issue, How Do I Tighten Security on My System?, Bruce Schneier, "It doesn't look good.", Will Crypto Feast on Carnivore?, An Old Spy with a New Vision of Encryption, The Coroner's Toolkit, Running logcheck, the logfile auditing software for Unix, Tools of the Trade: nmap, and more.

tags | remote, root, cryptography, vulnerability
systems | linux, unix
SHA-256 | bf97af94972bb92cba5531ed28482ba88123a064e99f846d6a1dee8d69777140
linux-security.1-14.txt
Posted Aug 7, 2000
Authored by Benjamin Thomas | Site linuxsecurity.com

Linux Security Week July 31 - In this issue: Advisories for gpm, man, dhcp-client, Zope, openldap, BitchX, pam, and nfs-utils were released. DHCP-client and nfs-utils vulnerabilities can both theoretically be used to gain remote root access. Also includes stories on Forensics, Full Disclosure, Apache Guide: Apache Authentication, Linux Networking: Using Ipchains, and more.

tags | remote, root, vulnerability
systems | linux
SHA-256 | 53a3ce522ea0cc51a50378cf56e30c25844d0a1a4498b216d2c3d13c0ae71780
GnuPG-0.06.tar.gz
Posted Aug 7, 2000
Authored by Francis J. Lacoste | Site indev.insu.com

GnuPG.pm is a perl interface to the Gnu Privacy Guard. The API can be used to encrypt, decrypt, sign and verify messages. It also offers basic key management.

Changes: Minor bugfixes, compatability with Gnupg v1.0.2.
tags | perl, encryption
SHA-256 | 75b6e7e56fef3411cd94ef5887c6a80902e818cf0c40855cbb3906a1216aa334
Fwctl-0.28.tar.gz
Posted Aug 7, 2000
Authored by Francis J. Lacoste | Site indev.insu.com

Fwctl is a program that intends to make it easier to configure a tight firewall. It provides a configuration syntax that is easier to use and more expressive than the low-level primitives offered by ipchains. It supports multiple interfaces, masquerading and packet accounting. Fwctl doesn't replace a good security engineer, but it can make the job of the security engineer simpler.

Changes: A new module for the ICA protocol was added. Minor bugfixes were made. This release requires Net-IPv4Addr >= 0.10 for security issues.
tags | tool, firewall
systems | linux
SHA-256 | ef78eaa07f104b54c483cccb9e45ab603b17d054dd6eb898f6e1efd07d9ebef6
SUN MICROSYSTEMS SECURITY BULLETIN: #00196
Posted Aug 7, 2000
Site sunsolve.sun.com

Patch advisory for Sun Microsystems. Please read for details.

tags | remote, arbitrary
SHA-256 | 91bf9b7b281591e766b6344743fb022c9dc72740a348d5eeecb729b8d1716679
nabou-1.2.tar.gz
Posted Aug 7, 2000
Authored by Thomas Linden | Site 0x49.org

nabou is a Perl script which can be used to monitor changes to your system. It provides file integrity checking, and can also watch crontabs, suid files and user accounts for changes. It stores all data in standard dbm databases.

tags | tool, perl, intrusion detection
systems | unix
SHA-256 | 514d306db836a86d3801aa340487882f8feb7be7f580769d2729832e7c3731c5
motion-1.5.tar.gz
Posted Aug 7, 2000
Authored by Jeroen Vreeken | Site motion.technolust.cx

motion uses a video4linux device as a motion detector. It will make snapshots of the movement it sees, making it usable as an observation or security system. It can send out email, SMS messages, or invoke an external command when detecting motion.

Changes: Support for feeding images to a video4linux loopback device was added. A division by zero bug was fixed. An "install" target was added to the Makefile.
systems | linux
SHA-256 | 32b29757d4b7aab2b0a579f31e1ecbcd70420893881972080e1daac818d5b630
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close