what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2000-08-07 to 2000-08-08

saint-2.1.2.tar.gz
Posted Aug 7, 2000
Site wwdsi.com

SAINT (Security Administrator's Integrated Network Tool) is a security assesment tool based on SATAN. It is updated regularly and scans for just about all remotely detectable vulnerabilities. Features include scanning through a firewall, updated security checks from CERT & CIAC bulletins, 4 levels of severity (red, yellow, brown, & green) and a feature rich HTML interface.

Changes: This version includes all of the vulnerability checks introduced in beta 1, plus checks for O'Reilly Website pro and BEA Weblogic servers, and a fix for the Cold Fusion false positive bug.
tags | tool, scanner, vulnerability
systems | unix
SHA-256 | e3417540cb7b585313abf432ccd7963f3f7b75713cc2941efc9f0e78a49287bc
linux-security.1-15.txt
Posted Aug 7, 2000
Authored by Benjamin Thomas | Site linuxsecurity.com

Linux Security Week August 7 - In this issue: Advisories for mailman, netscape, cvsweb, kon2, and pam_console. Of these, remote root vulnerabilities are present in cvsweb and kon2. Also includes a feature article on the US and UK governments wanting to install a device on public networks to monitor traffic for suspected criminal activity, Interivew with Jasta: coder of Gnapster, Discussion of "Linux Sux Redux" Issue, How Do I Tighten Security on My System?, Bruce Schneier, "It doesn't look good.", Will Crypto Feast on Carnivore?, An Old Spy with a New Vision of Encryption, The Coroner's Toolkit, Running logcheck, the logfile auditing software for Unix, Tools of the Trade: nmap, and more.

tags | remote, root, cryptography, vulnerability
systems | linux, unix
SHA-256 | bf97af94972bb92cba5531ed28482ba88123a064e99f846d6a1dee8d69777140
linux-security.1-14.txt
Posted Aug 7, 2000
Authored by Benjamin Thomas | Site linuxsecurity.com

Linux Security Week July 31 - In this issue: Advisories for gpm, man, dhcp-client, Zope, openldap, BitchX, pam, and nfs-utils were released. DHCP-client and nfs-utils vulnerabilities can both theoretically be used to gain remote root access. Also includes stories on Forensics, Full Disclosure, Apache Guide: Apache Authentication, Linux Networking: Using Ipchains, and more.

tags | remote, root, vulnerability
systems | linux
SHA-256 | 53a3ce522ea0cc51a50378cf56e30c25844d0a1a4498b216d2c3d13c0ae71780
GnuPG-0.06.tar.gz
Posted Aug 7, 2000
Authored by Francis J. Lacoste | Site indev.insu.com

GnuPG.pm is a perl interface to the Gnu Privacy Guard. The API can be used to encrypt, decrypt, sign and verify messages. It also offers basic key management.

Changes: Minor bugfixes, compatability with Gnupg v1.0.2.
tags | perl, encryption
SHA-256 | 75b6e7e56fef3411cd94ef5887c6a80902e818cf0c40855cbb3906a1216aa334
Fwctl-0.28.tar.gz
Posted Aug 7, 2000
Authored by Francis J. Lacoste | Site indev.insu.com

Fwctl is a program that intends to make it easier to configure a tight firewall. It provides a configuration syntax that is easier to use and more expressive than the low-level primitives offered by ipchains. It supports multiple interfaces, masquerading and packet accounting. Fwctl doesn't replace a good security engineer, but it can make the job of the security engineer simpler.

Changes: A new module for the ICA protocol was added. Minor bugfixes were made. This release requires Net-IPv4Addr >= 0.10 for security issues.
tags | tool, firewall
systems | linux
SHA-256 | ef78eaa07f104b54c483cccb9e45ab603b17d054dd6eb898f6e1efd07d9ebef6
SUN MICROSYSTEMS SECURITY BULLETIN: #00196
Posted Aug 7, 2000
Site sunsolve.sun.com

Patch advisory for Sun Microsystems. Please read for details.

tags | remote, arbitrary
SHA-256 | 91bf9b7b281591e766b6344743fb022c9dc72740a348d5eeecb729b8d1716679
nabou-1.2.tar.gz
Posted Aug 7, 2000
Authored by Thomas Linden | Site 0x49.org

nabou is a Perl script which can be used to monitor changes to your system. It provides file integrity checking, and can also watch crontabs, suid files and user accounts for changes. It stores all data in standard dbm databases.

tags | tool, perl, intrusion detection
systems | unix
SHA-256 | 514d306db836a86d3801aa340487882f8feb7be7f580769d2729832e7c3731c5
motion-1.5.tar.gz
Posted Aug 7, 2000
Authored by Jeroen Vreeken | Site motion.technolust.cx

motion uses a video4linux device as a motion detector. It will make snapshots of the movement it sees, making it usable as an observation or security system. It can send out email, SMS messages, or invoke an external command when detecting motion.

Changes: Support for feeding images to a video4linux loopback device was added. A division by zero bug was fixed. An "install" target was added to the Makefile.
systems | linux
SHA-256 | 32b29757d4b7aab2b0a579f31e1ecbcd70420893881972080e1daac818d5b630
Page 1 of 1
Back1Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close