what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2001-07-17

syslog-ng-1.4.12.tar.gz
Posted Jul 17, 2001
Authored by Balazs Scheidler | Site balabit.hu

syslog-ng is a multi-platform syslogd replacement, with lots of new functionality. The original syslogd allows messages only to be sorted based on priority/facility pair, syslog-ng adds the possibility to filter based on message contents using regular expressions. The configuration scheme is both intuitive and powerful.

Changes: New stable release - A date parsing bug and a signal setup bug have been fixed. Requires libol.
tags | system logging
systems | unix
SHA-256 | d4d3bc043ac32bae2d82f2b91830abca12aba7bff2bdf1379d396f5a0d4608d7
lomac-v1.1.1.tar.gz
Posted Jul 17, 2001
Site pgp.com

LOMAC is a dynamically-loadable security module for Free UNIX kernels that uses Low Water-Mark Mandatory Access Control (MAC) to protect the integrity of processes and data from viruses, Trojan horses, malicious remote users, and compromised network server daemons. The LOMAC loadable kernel module can be used to harden Linux systems without any changes to existing kernels, applications, or configuration files. Due to its simplicity, LOMAC itself requires no configuration, regardless of the users and applications present on the system. Whitepapers available

Changes: Capability and protection improvements. Changelog available <a href="http://opensource.nailabs.com/lomac/docs/changelog.html"here.
tags | remote, kernel, trojan
systems | linux, unix
SHA-256 | a364baae205e84f39f6e346400744e8ab469805a48bbf940fbc54d1e10a2bfb7
ferm.tar.gz
Posted Jul 17, 2001
Site geo.vu.nl

ferm v1.0pl8 compiles ready-to-go firewall rules from a structured rule-setup. These rules will be executed by the preferred kernel interface, such as ipchains and iptables. ferm will also add in modularizing firewalls, because it creates the possibility to split up the firewall into several different files, which can be loaded at will, so you can dynamically adjust your rules.

tags | tool, kernel, firewall
systems | unix
SHA-256 | 8a08d855f3fe640fc7f344ba40c79e07a3272920ee837f1d352e1b2ba6719495
ethereal-0.8.19.tar.gz
Posted Jul 17, 2001
Authored by Gerald Combs | Site ethereal.com

Ethereal is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Ethereal features that are missing from closed-source sniffers. Screenshot available here.

Changes: Text2pcap, a utility to convert text hexdumps to pcap files has been added. A new utility called mergecap combines capture files. Idl2eth is a powerful tool which can generate a dissector from an IDL file. New dissectors include Appletalk Data Stream Interface, AUTH_DES, DVMRP, GIOP, Gnutella, iSCSI, ISUP, M2PA, MP-BGP message, MSDP, MTP3, PAP, PIMv1, RFC 2250 MPEG1, and for gamers, QuakeWorld and Quake II.
tags | tool, sniffer, protocol
systems | unix
SHA-256 | f96e51ccf13e9b13fb80a837de32b9f016e62aabed02338d3964c5886d9ae554
npulse-0.54.tar.gz
Posted Jul 17, 2001
Authored by Dr. Steven Horsburgh | Site horsburgh.com

nPULSE is a web-based network monitoring package for Unix-like operating systems. It can quickly monitor tens, hundreds, even thousands of sites/device s at a time on multiple ports. nPULSE is written in Perl, uses nmap as its core scanning engine, and comes with its own mini web server for extra security.

Changes: This version bundles together all of the changes in the developmental releases of nPulse since version 0.52. The primary updates are better EventLog handling, and a major bug fix of the historical record-keeping and historical display graphics. Internally, the code has been substantially rewritten (except autorecheck.pl). In total there are 5 new features, 1 deleted feature, 5 bug fixes, and 4 miscellaneous changes.
tags | tool, web, perl, nmap
systems | unix
SHA-256 | 800439f4306056aba2feb40201190d05bf8f793ad9ba37f19bebb3960641f06d
stunnel-3.15.tar.gz
Posted Jul 17, 2001
Authored by Michal Trojnara | Site stunnel.org

Stunnel is a program that allows you to encrypt arbitrary TCP connections inside SSL (Secure Sockets Layer) available on both Unix and Windows. Stunnel can allow you to secure non-SSL aware daemons and protocols (like POP, IMAP, NNTP, LDAP, etc) by having Stunnel provide the encryption, requiring no changes to the daemon's code.

Changes: A serious bug which resulted in random transfer() hangs was fixed. A new ./configure option, --with-tcp-wrappers, was added. POP3 protocol client support, NNTP protocol client support, and RFC 2487 (SMTP STARTTLS) client mode support were added.
tags | arbitrary, encryption, tcp, imap, protocol
systems | windows, unix
SHA-256 | 6e4d7e447da11663c0fcc3a2d11473a11cf10c1749296834f5f4397a88f6e5df
log_analysis-0.38.tar.gz
Posted Jul 17, 2001
Authored by Mordechai T. Abzug | Site linux.umbc.edu

Log_analysis is a log file analyzer which extracts relevant data for any of the recognized log messages and produces a summary that is much easier to read and can be easily configured to recognize entirely new log types. log_analysis natively understands about 100 different kinds of syslog messages, as well as sulog and wtmp messages for Linux, Solaris, and OpenBSD.

Changes: More sorting options, per-category sorting and output filters, derived category support, and a new 'UNIQUE' pattern destination.
tags | system logging
systems | linux, unix, solaris, openbsd
SHA-256 | 35732b17e1e80a93fb35ca0eae6650428094b21c32c6df4e2dc6d312d3bc5a54
aldebaran-3.0.1.tar.gz
Posted Jul 17, 2001
Site rogala.3d.pl

Aldebaran is an advanced libpcap-based network TCP, UDP, and ARP network sniffer which gives a user only a payload from captured data and basic info about addresses and ports (nothing about flags, etc.). This is useful for monitoring data sent by connections and sniffing passwords. It supports filtering packets with not only simple port/address libpcap rules but also payload contents and can send captured data to another host via UDP. It can also encrypt data written to a dump file, analyze interface traffic, and present statistics (packet count, sizes, average speed, etc.) in HTML or a plain text file.

tags | tool, udp, sniffer, tcp
SHA-256 | 5b29ff9b1edfb18e2c818dd568e38feeff1400484416ae12ab48a949c22889cf
portsentry-1.1.tar.gz
Posted Jul 17, 2001
Authored by Craig Rowland | Site psionic.com

PortSentry is a program designed to detect and respond to port scans against a target host in real-time. It runs on TCP and UDP sockets and works on most UNIX systems. Advanced stealth detection modes are available under Linux only and detect SYN, FIN, NULL, XMAS, and Oddball packet scans. All modes support real-time blocking and reporting of violations. All modes support real time alerting and blocking.

Changes: Added netmask ignoring support, a toggle for DNS lookups, and can prioritize response/external commands. The Linux 2.4 CPU usage bug has been fixed.
tags | tool, udp, tcp, intrusion detection
systems | linux, unix
SHA-256 | eb06f3c328614365a9fe61b8878acb76cbf364cb695dda37536a3b0e07a13f1f
knocker-0.2.0.tar.gz
Posted Jul 17, 2001
Site knocker.sourceforge.net

Knocker is a simple and easy-to-use TCP security port scanner written in C. It is able to analyze hosts and the network services which are running on them. Knocker it is available for Linux and Unix platforms. Both a console version and a GTK+ version are available.

Changes: knocker attempts to resolve an host IP address before the port scan is started; it aborts the scan if the host IP can't be resolved.
tags | tool, scanner, tcp
systems | linux, unix
SHA-256 | 0296ad8f3be20dff4b9a2073b693525011e9861389d84b7b034f002d1d31d8f6
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close