Menu
Submit Site
Home
Computer
Software
All sites of Software
icmpquery
icmpquery- icmpquery is a tool for sending and receiving ICMP queries for the destinations address mask and current time. ...
IPTraf
IPTraf- IPTraf is a console-based network statistics utility that gathers TCP connection paket and byte counts, interface statistics, and activity indicators. Also captures all TCP/UDP packets. ...
COLD
COLD- Protocol LAN analyzer that can monitor various interfaces: ISDN, PPP, Token Ring, standard: loopback, 10baseT Ethernet. ...
Etherboot
Etherboot- Free software package for booting x86 PCs over networks. ...
Fake
Fake- Allows the user to take over the IP address of another machine in the user's LAN via ARP spoofing. ...
Hping
Hping- A network scanner that uses spoofed source address packets. Mainly used to test firewall rules and to perform advanced TCP/IP related attacks like the idle scan. ...
CVoiceControl
CVoiceControl- CVoiceControl is a speech recognition system that allows the user to connect spoken commands to Unix commands. ...
TODE (TOrch DEcoder)
TODE (TOrch DEcoder)- is a machine-learning library with speech recognition tools (embedded training and large vocabulary decoding). ...
FreeSpeech - Free Speech Recognition for Linux
FreeSpeech - Free Speech Recognition for Linux- Openmind (Freespeech) is a free speech recognition project for Linux It will be designed so that it can be easily integrated into any application or windowmanager as well a ...
VoxForge
VoxForge- collects transcribed speech (to create a speech corpus) for the creation of acoustic models for Free and Open Source speech recognition engines. ...
Julius
Julius- High-performance, two-pass large vocabulary continuous speech recognition (LVCSR) decoder. ...
Linux Standard Base
Linux Standard Base- The goal of the Linux Standard Base (LSB) is to develop and promote a set of standards that will increase compatibility among Linux distributions and enable software applications to run on any compli ...
UNIX System Interface Tables
UNIX System Interface Tables- These pages contain tables of all the Commands and System interfaces defined in UNIX 98, complete with an indication of their availability in UNIX 95, the ISO POSIX-1 standard, the ISO POSIX ...
BSD Tools for Linux
BSD Tools for Linux- A port of the basic BSD tools (ls, chmod, and echo) for the Linux platform, released under the BSD license. ...
Debian: Security Information
Debian: Security Information- Details of current and archive security advisories. Includes mailing list and a security FAQ. ...
Red Hat Security
Red Hat Security- Official security news and advisories for Red Hat Linux. ...
Debian Bug Tracking System
Debian Bug Tracking System- Automatic system tracking bugs reported by users until they are resolved. ...
Linux Journal: Creating a Linux Firewall Using the TIS Firewall Toolkit
Linux Journal: Creating a Linux Firewall Using the TIS Firewall Toolkit- Benjamin Ewy explains very thoroughly how to build your own `bastion host' firewall with Linux using the Trusted Information Systems Firewall Toolk ...
Adding Security to Common Linux Distributions
Adding Security to Common Linux Distributions- Discusses ways Linux system administrators can secure a system from intruders, by Michael Jastremski, LinuxFocus July 1998. ...
EnGarde
EnGarde- Server distribution, goal: provide level of security needed to create corporate web presence or conduct business on Web. Security achieved via included software and using principle of least privilege; available ...
Owl
Owl- Openwall GNU/*/Linux is a server distribution; main means to security: proactive source code review, privilege separation; several other means also used. Available for use. English, French, German, Russian. ...
Devil-Linux
Devil-Linux- Small CD-based distribution used for firewalls, routers. System configuration settings are stored on separate floppy disk. Descriptions, news, documents, downloads, links. ...
Sentry Firewall CD
Sentry Firewall CD- Linux-based bootable CD suitable for use as low cost, easy to maintain firewall or IDS node. ...
Migrating to Astaro Security Linux
Migrating to Astaro Security Linux- Fed up with costly, complex firewalls, e-gaming firm eBet Ltd., picks open source security; senior systems administrator knew he needed to upgrade from Check Point 4.0 perimeter firewa ...
A Simple Scheme to Make Passwords Based on One-Way Functions Much Harder to Crack
A Simple Scheme to Make Passwords Based on One-Way Functions Much Harder to Crack- Discusses the possibility that crackers might generate and distribute a massive list of encrypted passwords. ...
YoLinux: Internet Server Security HowTo and Tutorial
YoLinux: Internet Server Security HowTo and Tutorial- This tutorial covers the installation and use of hacker protection software such as Portsentry, tripwire, ssh. It also covers configuration and administration steps t ...
Ritter's Crypto Glossary and Dictionary of Technical Cryptography
Ritter's Crypto Glossary and Dictionary of Technical Cryptography- Hyperlinked definitions and discussions of many cryptographic, mathematics, logic, statistics, and electronics terms used in cipher construction and anal ...
Securing NIS
Securing NIS- Provides a checklist on how to secure UNIX/Linux NIS (formerly YP) services in an intranet environment. ...
Setting up a secure Linux server
Setting up a secure Linux server- Setting up a secure Linux server using RedHat and the Linux From Scratch system. ...
UnOfficial SELinux FAQ
UnOfficial SELinux FAQ- A technical FAQ for the NSA SELinux project, which covers installation and implementation issues. ...
Firewalling and Proxy Server HOWTO
Firewalling and Proxy Server HOWTO- Teaches the basics of firewall systems and give you some detail on setting up both a filtering and proxy firewall on a Linux based PC, by Mark Grennan. ...
Secure POP via SSH mini-HOWTO
Secure POP via SSH mini-HOWTO- Explains how to set up secure POP connections using ssh, by Manish Singh. ...
Linux Security HOWTO
Linux Security HOWTO- Security issues that face the administrator, security philosophy, examples of how to secure the system from intruders. ...
Linux IPCHAINS-HOWTO
Linux IPCHAINS-HOWTO- Describes how to obtain, install and configure the enhanced IP firewalling chains software for Linux, and how they might be used, by Paul Russell. ...
Linux Bridge+Firewall Mini-HOWTO
Linux Bridge+Firewall Mini-HOWTO- A tutorial on how to setup a bridge and a firewall with Linux, by Peter Breuer. ...
Firewall Piercing mini-HOWTO
Firewall Piercing mini-HOWTO- Tutorial on using ppp over telnet to do network stuff transparently through an Internet firewall. (François-René Rideau) ...
Linux Security HOWTO
Linux Security HOWTO- General overview of security issues that face the administrator of Linux systems. It covers general security philosophy and a number of specific examples of how to better secure your Linux system fr ...
Network Security Information: UNIX
Network Security Information: UNIX- Network Security Library has links to many UNIX (and, especially, Linux) security articles on host hardening, security admin guides, and special purpose hardening tips. ...
Linux Administrator's Security Guide
Linux Administrator's Security Guide- A security guide aimed at administrators and users, available online in Acrobat PDF format, by Kurt Seifried. ...
Rule Set Based Access Control (RSBAC) for Linux
Rule Set Based Access Control (RSBAC) for Linux- RSBAC is another MAC kernel security enhancement project for Linux. The standard package includes a range of access control models like MAC, RC, ACL. Additionally, the run ...
Security patch for Linux kernel 2.4
Security patch for Linux kernel 2.4- Grsecurity is a set of security patches to the 2.4 tree of Linux kernels. The goal of the project is to create the most secure system possible while requiring minimum configuration ch ...
Security ACLs for Linux kernel
Security ACLs for Linux kernel- The site provides a patch for extended attributes and access control lists for Linux kernel. ...
The Linux Encryption HOWTO Homepage
The Linux Encryption HOWTO Homepage- The Linux Encryption-HOWTO seeks to describe all major development activities around Linux that provide encryption features to the kernel. ...
Ksplice
Ksplice- Provides Linux kernel extensions which allow system administrators to apply security patches to a running kernel without having to reboot the system. ...
The Linux Area
The Linux Area- Articles and messages boards discussing installation, programming, and troubleshooting. ...
Linux Forums.org
Linux Forums.org- A place to ask and answer Linux questions. ...
Linux Questions
Linux Questions- A free Linux forum where Linux newbies can ask questions and Linux experts can offer advice. ...
The Linux Cookbook
The Linux Cookbook- All-encompassing book on using open source software, which itself is open source and available online. ...
The CTDP Linux Operating System section
The CTDP Linux Operating System section- Contains several documents and articles about Linux. Many categorized Linux weblinks are included. Documents include a Linux User's Guide, How Linux Works Guide, and Files and Com ...
Attachmate Corporation
Attachmate Corporation- Remote access and Rally 5250 emulation software. ...
« First
Previous
Page 435 of 465.
Next
Last »
Latest sites from Software
Eploy
Sweep
Luke's Website
Qtractor
Ocenaudio
Symantec Removal Tools
AVG Free Edition
Free Data Recovery
Object Fix Zip
LocTeam
DigiPad
IBM Smarter Workforce
iApplicants
Localization World
I18n Guy
Anim8or
INUS Technology
Digital Juice
Polhemus
Color Schemer
Action3D Reducer
OpenACS
onShore
Abacus Systems Pty Ltd.
Advosol Inc.
Send feedback
submit