Libnids is a library that provides a functionality of one of NIDS (Network Intrusion Detection System) components, namely E-component. It means that libnids code watches all local network traffic, cooks received datagrams a bit (quite a bit ;)), and provides convinient information on them to analyzing modules of NIDS. So, if you intend to develop a custom NIDS, you don't have to build low-level network code. If you decide to use libnids, you have got E-component ready - you can focus on implementing other parts of NIDS.
37aab0e12817880ae502de7bec0810e0df2e1c6ee7cd328e933f0bca7751c656
Versioner 0.4: Source code. Versioner is a command line tool that traverses directories gathering the file properties described below. Versioner will output its information in a human readable text format as well as a comma seperated version that can be imported directly into MS-Excel or MS-Access. It is useful to anyone who wishes to maintain control over file versions from either a security or compatibility aspect.
83c2cb2763ce18eb7438821f2011ae0ea994e221d2cc17951c44359d0f30b101
Versioner 0.4: Binary distribution. Versioner is a command line tool that traverses directories gathering the file properties described below. Versioner will output its information in a human readable text format as well as a comma seperated version that can be imported directly into MS-Excel or MS-Access. It is useful to anyone who wishes to maintain control over file versions from either a security or compatibility aspect.
91a7f19d27b6d4287ff71dda6b47654fd6d52d5659ab2e0090657f1a47004e9f
Static linux binary for ngrep 1.35.
de58a4bda1fcf89bd2f42affba85873ba5e04bce8cb96cb71941b53188a62b11
ngrep is an awesomly powerful network too which strives to provide most of GNU grep's common features, applying them to the network layer. ngrep is a pcap-aware tool that will allow you to specify extended regular expressions to match against data payloads of packets. It currently recognizes TCP, UDP and ICMP across Ethernet, PPP, SLIP and null interfaces, and understands bpf filter logic in the same fashion as more common packet sniffing tools, such as tcpdump and snoop.
8e9c02d7d666c89fcef1675ad1bb9e4d4c2c0b6f12111f29ea122e8bca9d8c4b
"libpwrite" - A C library for portable packet creation. Libnet is an API to help with the construction and handling of network packets. It provides a portable framework for low-level network packet writing and handling (use libnet in conjunction with libpcap and you can write some really cool stuff).
ce8af7b861f3663f4910d026b536b9c5bd714f68ab9422629fabd8771d4f7da2
Default newsletter Issue #7. Includes Setting up a great desktop Linux, How to make safe Windows 95 based server, Web based encrypted e-mail (critic and the response), Welcome to the wonderful world of cellular phreaking, Unix logging and auditing tools, and Freedom of the speech related incidents.
2794b94e3bc6575c0ec03735ecef55d627af7b4c60a32a0ff16b93f06766d783
Adding new services to the Windows NT kernel (Native API) on intel X86 processors. Version 0.81.
c6f6384f6b9e9467c3f627de844e172d83aae5c41e789cecfda274df0f75bf2e
Remote exploit for dopewars-1.4.4. Exploit works for servers as well as clients. Produces a shell.
6ba59e6009b05be123b6af5928e78b018f173818061ec3c4bfedafabca9b0987
Gives you access to the registry, dos, display properties etc' (control panel too in the next version). Archive password is set to p4ssw0rd. Use at your own risk.
c0e7602f9f22d7569c787cf797f50f6eaed01dba30d5b509ba3d1ea16f6564b9
Tired of all those annoying windows trojans? are you a sysadmin who's afraid that unsuspecting users on his/her network might run trojans and then come to him with complaints? wanna help your friends by scanning them for trojans? wanna be the greatest script kiddie in the world? then download this super-fast local/remote remote administration trojans scanner (scans for hundreds of annoying trojans).
5c15520fefd5605f5657f5a949af8ad6ed654a62e971f0b206e27b9b80e8e7c6
Well written paper on securing linux for newbies. Lots of good and updated info. Version 1.1.
dd27f287c4429d8d76381c494dc21d247077b1a81c69eb8810e41786d60f5274
These calculations show that Microsoft may be guilty of murder, on order of several people per day.
23297b92fb766ca9043cf40b8f3d40fae47a45104b5f56247da2fb43da000a2d