what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2001-04-15 to 2001-04-16

srm-1.2.3.tar.gz
Posted Apr 15, 2001
Authored by Matthew Gauthier | Site srm.sourceforge.net

secure rm (srm) is a command-line compatible rm(1) which completely destroys file contents before unlinking. The goal is to provide drop in security for users who wish to prevent command line recovery of deleted information, even if the machine is compromised.

Changes: A file descriptor leak when prompting for files has been fixed.
systems | unix
SHA-256 | 5317bee6c336ae8a4fa3824ff77d3c4aef16796564833c2c362244b8bb5da00d
amavis-perl-11.tar.gz
Posted Apr 15, 2001
Site amavis.org

AMaViS (A Mail Virus Scanner) scans e-mail attachments for viruses using third-party virus scanners available for UNIX environments. It resides on a UNIX (Linux) machine and looks through the attached files arriving via e-mail, generates reports when a virus is found and sets the delivery on hold.

Changes: Added support for Command AntiVirus (CSAV) for Linux preliminary support for sendmail milter interface, requires Archive-Zip from CPAN! The unzip command is not needed anymore, new options to configure script. configure now checks for AvpBSDDaemon, too. Found virus(es) now listed in notification messages to sender and recipient(s); no notification message is returned to the sender if the sender address is empty, or if precedence is bulk/list. Drastically improved logging facility to make debugging easier.
tags | virus
systems | linux, unix
SHA-256 | 85d200152bb7afaf20431cd61a1bb5021457a538ca3a299bdbcbf8157a902f60
jail_1-2_stable.tar.gz
Posted Apr 15, 2001
Site gsyc.inf.uc3m.es

Jail is a chrooted environment using bash. its main use is to put it as shell for any user you want to be chrooted. Their primary goals is to be simple, clean, and highly portable.

Changes: This release adds path splitting, so you can have multiple users in a single chrooted environment (useful for isolating groups of users). It adds ChangeLog, TODO, and INSTALL files, renames the mkenv.sh for each platform, and adds a Mkenv for Red Hat 6.2.
tags | shell, bash
systems | unix
SHA-256 | 46120bb892730dda1ab7643153e5b2d4924923214141d2c76407a37ca7bb7065
corkscrew-1.3.tar.gz
Posted Apr 15, 2001
Site agroman.net

corkscrew is a small program for tunneling SSH through HTTP proxies. It features easy configuration and support for several Unix variants.

tags | web
systems | unix
SHA-256 | 07b30683ac4405b8404438fd3c9fc3653c5b15aabce96f284f2fc72b23103ba6
gShield-2.3.tgz
Posted Apr 15, 2001
Authored by R. Gregory | Site muse.linuxmafia.org

Shield is an aggressive, modular firewall script for iptables which features easy configuration through a BSD-style configuration file, optional NAT support, TCP-wrapper-like functionality for service access, port forwarding, routable protection, DMZ support, and more.

Changes: Change for this release include: ifconfig now defined as a variable, reordered the blacklist/NAT chain ordering, folded in multi-homed logic, fixed typos (including one affecting HTTPS), and added misc comment updates.
tags | tool, tcp, firewall
systems | linux, bsd
SHA-256 | 95a856340d6fa4f4a8559f3a3027602a3341338eb3c89b254620297464326391
bastard-0.08.tgz
Posted Apr 15, 2001
Site bastard.sourceforge.net

A disassembler written for disassembly of x86 ELF targets on Linux (other file formats/CPUs can be 'plugged in'). Written as a backend or engine -- the UI is a command line; support for controlling the disassembler via pipes or FIFOs is provided. Note that this disassembler does not rely on libopcodes to do its disassembly; rather, the 'libi386' plugin is a standard .so that can be reused by other projects.

Changes: The base functionality is there, but the code is not complete. The program depends upon: libreadline [not included], typhoon RDB [included], and seer interpreter [included]. Basic [non-FPU, non-MMX, etc] x86 instructions are supported. Work is currently being done on adding higher-level disassembly[/decompilation] features. As of .08, address naming, subroutine recognition, xrefs, and library imports are functional. Strings are 'in the works.' Documentation is sparse.
tags | x86
systems | linux
SHA-256 | 6a45ac0ea697d4b71994d3441b9fe0d946819bbd9ee3082f187536aa7225c3b6
fwipe-0.35.tar.gz
Posted Apr 15, 2001
Authored by Len Budney | Site pobox.com

fwipe overwrites your file a specified number of times (default: 5) and then deletes it. It is extremely secure; it will not be confused by filenames containing special characters, and is suitable for use against law enforcement.

Changes: This release adds Red Hat 6.2 RPM support.
systems | unix
SHA-256 | 410017ec23299d957bad67cc636590ed79adf2dd46903f04e2fecfb5e00ec329
comclear-1.2.tar.gz
Posted Apr 15, 2001
Site neuro-tech.net

ComClear is a history cleaner for Netscape Navigator and Communicator which allows a user to choose from deleting the cache, cookies, history, and drop-down list. Comclear has both a command-line version and a GTK+ version, the latter of which is run automatically when ComClear is run from an X session.

Changes: This release has better RPM packaging, and a GNOME application link.
tags | web
SHA-256 | fabf7d7bfe1845fb4534027f3a781f08d46f37d773322ca2c1d4749a672a03c6
xscreensaver-3.32.tar.gz
Posted Apr 15, 2001
Authored by Jamie Zawinski | Site jwz.org

XScreenSaver is a modular screen saver and locker for the X Window System. It is highly customizable and allows the use of any program that can draw on the root window as a display mode. It is also more stable than xlock.

Changes: The image-manipulating hacks ('slidescreen', etc) can now operate on randomly chosen image files from disk, or on frames captured from the system's video input, instead of (or in addition to) manipulating images of the desktop. 'vidwhacker' has been rewritten to use the new image-grabbing mechanism. Bug fixes are included.
tags | root
systems | unix
SHA-256 | 5ba5d86abd0c8a7c492f8219dfa91dd8def14d96897a0f2823207237a649c2db
ath.pl
Posted Apr 15, 2001
Authored by Grande Mulo

Perl exploit for the well known ath+++ bug which causes some modems to hang up.

tags | denial of service, perl
SHA-256 | 88691fa61a4d336d867e72e0548f6d8ec02269923f169864de37eaa4fc202891
debian.exuberant-ctags.txt
Posted Apr 15, 2001
Site debian.org

Debian Security Advisory DSA-046-1 - The exuberant-ctags packages as distributed with Debian GNU/Linux 2.2 creates temporary files insecurely. This has been fixed in version 1:3.2.4-0.1 of the Debian package, and upstream version 3.5.

systems | linux, debian
SHA-256 | 17eceaea16a06fde0506424fbb9498b4a83a85ee0de527bb888efd0268e139e3
crypto-gram-0104.txt
Posted Apr 15, 2001
Authored by Bruce Schneier, crypto-gram | Site counterpane.com

Crypto-gram for April 15, 2001. In this issue: Natural Advantages of Defense: What Military History Can Teach Network Security, Part 1, A Correction: nCipher, CSI's Computer Crime and Security Survey, Crypto-Gram Reprints, and Fake Microsoft Certificates.

tags | cryptography, magazine
SHA-256 | 341b3529b2ea2c8c9a00ad34655943b05387e5d7056707073869ca80e4b44d0c
libmix-122.tgz
Posted Apr 15, 2001
Authored by Mixter | Site mixter.void.ru

LibMix is a library that provides an API for various useful functions, including an AES encryption interface, various network front-ends and low level datagram functions, as well as functions for string manipulations and other miscellaneous utility functions. It also includes functions to transmit encrypted data via stateless spoofed datagrams (tfntransmit/tfnread).

Changes: Added lm_scan_run (callback function to easily build scanners and similar tools), and faster conversion functions, lm_addr and lm_ntoa.
tags | spoof
SHA-256 | 3ede82477a74c9bed8a16871140f28014546d82ae8bb96930b6d37e11009edbf
Q-2.4.tar.gz
Posted Apr 15, 2001
Authored by Mixter | Site mixter.void.ru

Q v2.4 is a client / server backdoor which features remote shell access with strong encryption for root and normal users, and a encrypted on-demand tcp relay/bouncer that supports encrypted sessions with normal clients using the included tunneling daemon. Also has stealth features like activation via raw packets, syslog spoofing, and single on-demand sessions with variable ports.

Changes: Now uses strong RSA/libiSSL encryption for sessions; compatibility with libmix1.2; many bugfixes.
tags | remote, shell, root, spoof, tcp
SHA-256 | 2d8a95a485190f541768a388e0121ea5d72b3a2fef27146e83365acda245229d
FreeBSD Security Advisory 2001.31
Posted Apr 15, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:31.ntpd - An overflowable buffer exists in the ntpd daemon related to the building of a response for a query with a large readvar argument. Due to insufficient bounds checking, a remote attacker may be able to cause arbitrary code to be executed as the user running the ntpd daemon, usually root. All versions of FreeBSD prior to the correction date, including FreeBSD 3.5.1 and 4.2, and versions of the ntpd port prior to ntp-4.0.99k_2 contain this problem.

tags | remote, overflow, arbitrary, root
systems | freebsd
SHA-256 | db62a64df5fc4a1f4b35e133e3e769d11a44d1101cdb9842fc7edcb3682a6e2c
Page 1 of 1
Back1Next

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close