what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2001-01-03

Posted Jan 3, 2001
Site ssh.org

SSH (Secure Shell) Windows Port is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another, providing strong authentication and a secure communications over insecure channels.

Changes: Bug fixes and improvements.
tags | remote, shell, encryption
systems | windows
SHA-256 | 7ddba53dcf1a1a9503ca06a93b44c863b34e487daf6d252e8f0abf69940b8f27
Posted Jan 3, 2001
Site ssh.org

SSH (Secure Shell) is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another, providing strong authentication and a secure communications over insecure channels.

Changes: Added Cast-128 cipher, implemented FTP forwarding (secure tunnels are created on the fly for data connections and port numbers are spoofed), implemented RSA SecurID authentication, implemented PAM authentication, and bug fixes.
tags | remote, shell, encryption
SHA-256 | 95cece99986eec8f550ae0ba78457254e725b88282fe2f3337b5308db23a84d5
Posted Jan 3, 2001
Site ssh.com

SSH v2.4.0 server for Windows.

tags | encryption
systems | windows
SHA-256 | a374fb7c91cbb9beb34130128b5a55da475b161d224643043e1a4c2479654856
Posted Jan 3, 2001
Authored by Jim Brooks | Site jimbrooks.org

hypersrc is a GUI program for browsing source code, which uses GTK+. It provides a list widget containing sorted source code tags. A programmer can click a tag to hyperlink to a particular tagged line in a source code file. Screenshot here.

Changes: Fixed all known segfaults.
systems | linux
SHA-256 | e207046f65bd61093049aee58e950c824eef84f69463e5a7db0db8d22e977399
Posted Jan 3, 2001
Authored by Balazs Scheidler | Site balabit.hu

Zorp is a new-generation modular proxy firewall suite to fine tune proxy decisions with its built in script language, fully analyze complex protocols (like SSH with several forwarded TCP connections), and utilize outband authentication techniques (unlike common practices where proxy authentication had to be hacked into the protocol).

Changes: Ipchains support to add and remove rules at runtime was added, and bugfixes were included.
tags | tool, tcp, firewall, protocol
systems | unix
SHA-256 | b6d5141db75b7f9d6917a814374ff4b2765e6e1a37d694d1faef0c8720bc0705
Posted Jan 3, 2001
Site cs.uct.ac.za

IDS/A is an experimental interface between applications and a daemon which functions as system logger, reference monitor, and soon intrusion detection system. IDS/A is not yet complete, but can already be used as system log replacement with extra neat features such as automatic log rotation. It also ships with two example applications which demonstrate how the system can be used to block basic banner grabbing port or CGI scanners.

Changes: This release adds a pam module and a guile interface. It is now possible to write scheme programs to process, correlate and block events. A number of bugs have also been squashed and some internals have been rewritten, probably introducing new bugs.
tags | cgi, system logging
systems | unix
SHA-256 | 366dd2570a9d7e58748d70377398edff1a1da47522e07fbfa4b80dc6e628c3c2
Posted Jan 3, 2001
Site speakeasy.org

Firewall Log Daemon provides two programs, chaindaemon and tabledaemon, that you can choose between, depending on your firewall type (ipchains or iptables-netfilter). The program will start a small daemon process that parses and resolves firewall logs in real-time by reading a FIFO that syslog writes to. It will queue a batch of alerts and mail them to you. It features hostname, port, protocol, and ICMP type/code lookup, with formatted output for easy reading.

Changes: All fields in packet log are now captured and decoded, turning all hex values into their corresponding ascii bit strings. The included "decode.php" and corresponding template provides for a web-based log entry decoder. Various bugfixes.
tags | tool, firewall, protocol
systems | linux
SHA-256 | bde28ec499125eba35e9b5e2c151d4ad6f002ba0e1fb00eb4abc47dd73cbd088
Posted Jan 3, 2001
Site pgp.com

LOMAC is a security enhancement for Linux that uses Low Water-Mark Mandatory Access Control to protect the integrity of processes and data from viruses, Trojan horses, malicious remote users, and compromised root daemons. LOMAC is implemented as a loadable kernel module - no kernel recompilations or changes to existing applications are required. Although not all the planned features are currently implemented, it presently provides sufficient protection to thwart script-kiddies, and is stable enough for everyday use. Whitepaper available here.

Changes: First stable release! Includes a new manual, performance benchmarks, and bug fixes.
tags | remote, kernel, root, trojan
systems | linux
SHA-256 | e8698893749ac051296933821316469e9422a47ca94bb7b97b4f748fbffa1d72
Page 1 of 1

File Archive:

March 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    13 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    31 Files
  • 8
    Mar 8th
    16 Files
  • 9
    Mar 9th
    13 Files
  • 10
    Mar 10th
    9 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    10 Files
  • 14
    Mar 14th
    6 Files
  • 15
    Mar 15th
    17 Files
  • 16
    Mar 16th
    22 Files
  • 17
    Mar 17th
    13 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    16 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By