exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2001-01-03 to 2001-01-04

SSHWin-2.4.0.exe
Posted Jan 3, 2001
Site ssh.org

SSH (Secure Shell) Windows Port is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another, providing strong authentication and a secure communications over insecure channels.

Changes: Bug fixes and improvements.
tags | remote, shell, encryption
systems | windows
SHA-256 | 7ddba53dcf1a1a9503ca06a93b44c863b34e487daf6d252e8f0abf69940b8f27
ssh-2.4.0.tar.gz
Posted Jan 3, 2001
Site ssh.org

SSH (Secure Shell) is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another, providing strong authentication and a secure communications over insecure channels.

Changes: Added Cast-128 cipher, implemented FTP forwarding (secure tunnels are created on the fly for data connections and port numbers are spoofed), implemented RSA SecurID authentication, implemented PAM authentication, and bug fixes.
tags | remote, shell, encryption
SHA-256 | 95cece99986eec8f550ae0ba78457254e725b88282fe2f3337b5308db23a84d5
SSHWinServer.exe
Posted Jan 3, 2001
Site ssh.com

SSH v2.4.0 server for Windows.

tags | encryption
systems | windows
SHA-256 | a374fb7c91cbb9beb34130128b5a55da475b161d224643043e1a4c2479654856
hypersrc-2.1.6.tar.gz
Posted Jan 3, 2001
Authored by Jim Brooks | Site jimbrooks.org

hypersrc is a GUI program for browsing source code, which uses GTK+. It provides a list widget containing sorted source code tags. A programmer can click a tag to hyperlink to a particular tagged line in a source code file. Screenshot here.

Changes: Fixed all known segfaults.
systems | linux
SHA-256 | e207046f65bd61093049aee58e950c824eef84f69463e5a7db0db8d22e977399
zorp-0.7.10.tar.gz
Posted Jan 3, 2001
Authored by Balazs Scheidler | Site balabit.hu

Zorp is a new-generation modular proxy firewall suite to fine tune proxy decisions with its built in script language, fully analyze complex protocols (like SSH with several forwarded TCP connections), and utilize outband authentication techniques (unlike common practices where proxy authentication had to be hacked into the protocol).

Changes: Ipchains support to add and remove rules at runtime was added, and bugfixes were included.
tags | tool, tcp, firewall, protocol
systems | unix
SHA-256 | b6d5141db75b7f9d6917a814374ff4b2765e6e1a37d694d1faef0c8720bc0705
idsa-0.88.tar.gz
Posted Jan 3, 2001
Site cs.uct.ac.za

IDS/A is an experimental interface between applications and a daemon which functions as system logger, reference monitor, and soon intrusion detection system. IDS/A is not yet complete, but can already be used as system log replacement with extra neat features such as automatic log rotation. It also ships with two example applications which demonstrate how the system can be used to block basic banner grabbing port or CGI scanners.

Changes: This release adds a pam module and a guile interface. It is now possible to write scheme programs to process, correlate and block events. A number of bugs have also been squashed and some internals have been rewritten, probably introducing new bugs.
tags | cgi, system logging
systems | unix
SHA-256 | 366dd2570a9d7e58748d70377398edff1a1da47522e07fbfa4b80dc6e628c3c2
firelogd-1.3.tgz
Posted Jan 3, 2001
Site speakeasy.org

Firewall Log Daemon provides two programs, chaindaemon and tabledaemon, that you can choose between, depending on your firewall type (ipchains or iptables-netfilter). The program will start a small daemon process that parses and resolves firewall logs in real-time by reading a FIFO that syslog writes to. It will queue a batch of alerts and mail them to you. It features hostname, port, protocol, and ICMP type/code lookup, with formatted output for easy reading.

Changes: All fields in packet log are now captured and decoded, turning all hex values into their corresponding ascii bit strings. The included "decode.php" and corresponding template provides for a web-based log entry decoder. Various bugfixes.
tags | tool, firewall, protocol
systems | linux
SHA-256 | bde28ec499125eba35e9b5e2c151d4ad6f002ba0e1fb00eb4abc47dd73cbd088
lomac-v1.0.tar.gz
Posted Jan 3, 2001
Site pgp.com

LOMAC is a security enhancement for Linux that uses Low Water-Mark Mandatory Access Control to protect the integrity of processes and data from viruses, Trojan horses, malicious remote users, and compromised root daemons. LOMAC is implemented as a loadable kernel module - no kernel recompilations or changes to existing applications are required. Although not all the planned features are currently implemented, it presently provides sufficient protection to thwart script-kiddies, and is stable enough for everyday use. Whitepaper available here.

Changes: First stable release! Includes a new manual, performance benchmarks, and bug fixes.
tags | remote, kernel, root, trojan
systems | linux
SHA-256 | e8698893749ac051296933821316469e9422a47ca94bb7b97b4f748fbffa1d72
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close