LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: August 15th, 2014
Linux Advisory Watch: August 8th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Harden my filesystem
Find the HOWTO or step-by-step guide that you need right here.


RSBAC - Rule Set Based Access Control  07 January 2005 
Source: "RSBAC - Rule Set Based Access Control" - Posted by Administrator   
RSBAC is a flexible, powerful and fast open source access control framework for current Linux kernels, which has been in stable production use since January 2000 (version 1.0.9a). All development is independent of governments and big companies, and
 
PIKT  07 January 2005 
Source: "PIKT" - Posted by Administrator   
PIKTĀ® is a cross-categorical, multi-purpose toolkit to monitor and configure computer systems, organize system security, format documents, assist command-line work, and perform other common systems administration tasks.
 
Openswan  07 January 2005 
Source: "Openswan" - Posted by Administrator   
Openswan is an implementation of IPsec for Linux. It supports kernels 2.0, 2.2, 2.4 and 2.6, and runs on many different platforms, including x86, x86_64, ia64, MIPS and ARM.
 
Lud's Linux Corner  07 January 2005 
Source: "Lud's Linux Corner" - Posted by Administrator   
You will find security tips to improve your overall system security by the use of IPChains, IPTables, and TCP Wrappers. And you will learn some useful and subtle configuration options for Sendmail, Postfix, Bind, NFS and others.
 
linsec TWiki  07 January 2005 
Source: "linsec TWiki" - Posted by Administrator   
linsec TWiki is a web-based collaboration tool for a personal project detailing security on Linux in particular, but any *NIX-ish operating system (ie. OpenBSD, Mac OS X, etc.).
 
LinSec  07 January 2005 
Source: "LinSec" - Posted by Administrator   
LinSec, as the name says, is Linux Security Protection System. The main aim of LinSec is to introduce Mandatory Access Control (MAC) mechanism into Linux (as opposed to existing Discretionary Access Control mechanism).
 
LaBrea  07 January 2005 
Source: "LaBrea" - Posted by Administrator   
LaBrea takes over unused IP addresses, and creates virtual servers that are attractive to worms, hackers, and other denizens of the Internet. The program answers connection attempts in such a way that the machine at the other end gets "stuck", someti
 
Knocker  07 January 2005 
Source: "Knocker" - Posted by Administrator   
Knocker is a simple and easy to use TCP security port scanner written in C to analyze hosts and all of the different services started on them.
 
Kismet  07 January 2005 
Source: "Kismet" - Posted by Administrator   
Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic.
 
John the Ripper password cracker  07 January 2005 
Source: "John the Ripper password cracker" - Posted by Administrator   
John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords.
 
<< Start < Prev 4 5 6 Next > End >>

Results 51 - 60 of 121
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
State-of-the-art spear phishing and defenses
Linux kernel source code repositories get better security
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.