what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files Date: 2001-02-06

hap-linux-2.2.18-2.diff.gz
Posted Feb 6, 2001
Site doutlets.com

HAP-Linux is a collection of security related patches which are designed to be applied after Solar Designers Openwall patches are installed. Changes include some extra information in the printks, and the ability to allow hard links to files you don't own which are in your group, and the ability to follow links & pipes in +t directories iff they are not world-writable. This is useful for getting various daemons to run chrooted as a non-root user, and some secure drop- directory stuff.

tags | root, patch
systems | linux, unix
SHA-256 | 1ec3f85589533a855813a3831a0426e8c5df488ec2e2d29e74188b4d63c9dd09
tcpstat-1.4.tar.gz
Posted Feb 6, 2001
Authored by Paul Herman | Site frenchfries.net

tcpstat reports certain network interface statistics much like vmstat does for system statistics. It gets its information by either monitoring a specific interface, or by reading previously-saved tcpdump data from a file.

Changes: This is a maintenance release. A bug which prevented the "-s" option from working properly has been fixed, reading files from stdin is handled better, and tcpstat now compiles properly with the native HPUX compiler.
tags | tool
systems | unix
SHA-256 | 1ddcfe381f7a13ea79d5995aee91be5fff52c13701326fa4150536f51119da74
SAStk-0.1.1.tar.gz
Posted Feb 6, 2001
Site sourceforge.net

SAStk (Slackware Administrators Security tool kit) aims to provide a set of tools and utilities to install and maintain a reasonable level of security for the Slackware GNU/Linux distribution. At the same time, it should ease administration with a new centralized initialization setup and background information on what each daemon does.

systems | linux, slackware
SHA-256 | bfc842ed54590f871c5aab2b980ff916609dc165135fa4eeb3a897ac00e4517f
bugtraq.c
Posted Feb 6, 2001
Authored by Count Neithardt von Gneisenau

Bugtraq.c is an exploit for the Bind tsig bug which has been crippled somewhat. Tested against Slackware 7.0.

tags | exploit
systems | linux, slackware
SHA-256 | 76a57df25b9052d61775586136f76374287faa9aa43d5da33294c2b0e828877f
perlforce.pl
Posted Feb 6, 2001
Authored by Woozer | Site members.fortunecity.com

Perlforce is a perl version of Mirkforce, a program that allows you to load a lot of clones using addresses on your subnet. Now much more powerful than the origional mirkforce - Works on many IRC networks.

tags | perl
SHA-256 | 5cd27a5066cdc0c2d898454cfc1ca40a164a9b1760b6e67593c1d4d2b612b1c4
iptables.txt
Posted Feb 6, 2001
Authored by Brad Spengler

How to use Iptables - Explains the new features, how to use them, how to write rulesets, and includes a sample firewall script.

tags | paper
SHA-256 | 4466b2b5cdbeb6765ffa0cab3810925ead1ec435fdc75b1f44b3f4c9267bad2d
WinNTConfig.txt
Posted Feb 6, 2001
Authored by Leigh Purdie, George Cora | Site intersectalliance.com

Graded Risk Based Security Configuration for Windows NT - How to secure a Windows NT machine, based upon the agreed security risk profile of the target system. Includes Initial Installation, System Accounts, User Accounts and Rights, File and Registry Access Control, Network Access Control, Subsystems, Malicious Code, and Event Logging.

tags | paper, registry
systems | windows
SHA-256 | ffbf23df911e7c5224b0d2b57e46c3f1a5f6a965a21380ca0fc33b79f8cf576b
backlog.exe
Posted Feb 6, 2001
Site intersectalliance.com

BackLog is a Windows NT service that facilitates the real time central collection and processing of Windows NT Event Log information. All three event logs (Application, System and Security) are monitored, and event information is converted to comma delimited text format, then delivered over UDP to a remote server. BackLog is currently configured to deliver audit information to a SYSLOG server running on a remote (or local) machine.

tags | remote, local, udp
systems | windows
SHA-256 | 2a7e60ba1adf27e0116c79bce183db5f3823d8c50de29fce265044f753654e8e
razorback-0.1.0.tar.gz
Posted Feb 6, 2001
Site intersectalliance.com

Razorback is a log analysis program for Gnome which interfaces with the Snort Intrusion Detection System to provide real time visual notification when an intrusion signature has been detected on the network. Screenshot here.

tags | tool, sniffer
SHA-256 | 033824d50de2071828f3fb0259ca7de33e837ed9c03584736ce5c5cc2a0db09a
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    111 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close