Menu
Submit Site
Home
Computer
Software
All sites of Software
Tripwire Open Source
Tripwire Open Source- Open source version of the original Unix file integrity scanner. Calculates and stores signatures of file permissions, ownership and contents. Scans the same files later, detecting changes. This ope ...
NMAP Network Scanner
NMAP Network Scanner- Efficient stealth port scanner. Downloads, e-mail lists, news. ...
The Coroner's Toolkit (TCT)
The Coroner's Toolkit (TCT)- The Coroner's Toolkit (TCT) provides post-break-in data collection that could be useful in determining what happened. Less polished that the authors (Dan Farmer and Wietse Venema) usual work, ...
S4Software
S4Software- Secure4Privilege is a tool for complete access control to commands and scripts without giving out the root password. ...
LogSurfer
LogSurfer- Allows improved monitoring and alerting based on the contents of system logs. ...
lsof
lsof- lsof is a tool for examining I/O channels open on your Unix system. These can include files, FIFOs and network sockets. This information can be extremely useful for security and a variety of other purposes. Works o ...
OpenSSH - Portable Distribution
OpenSSH - Portable Distribution- Open source implementation of SSH1 and SSH2 protocols. Ported from OpenBSD by the OpenSSH portability team. ...
Lynis
Lynis- Unix system and security auditing tool. ...
USENIX Symposium on Security
USENIX Symposium on Security- The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in security of computer syst ...
Communications-Electronics Security Group
Communications-Electronics Security Group- Independently evaluates and certifies the level of trust that may be placed in IT security features. ...
Building a Bastion Host Using HP-UX 11
Building a Bastion Host Using HP-UX 11- Recipe by Kevin Steves for protecting HP-UX 11. ...
Exploit World
Exploit World- Archive of exploits for many systems. Pages have not been updated since 1998 and are preserved only for posterity. ...
John the Ripper password cracker
John the Ripper password cracker- A portable password cracker with built-in efficient implementations of multiple password hashing algorithms found on various Unix flavors. ...
Rscan
Rscan- Tool that lets a system administrator run complex or simple scanner scripts on any number of machines in a heterogeneous environment. Unmaintained since 1995. ...
Vapid Labs
Vapid Labs- Lists vulnerabilities, white papers and utilities. ...
NIST Computer Security Resource Clearinghouse
NIST Computer Security Resource Clearinghouse- Collects and disseminates computer security information and resources to help users, systems administrators, managers, and security professionals better protect their data a ...
AIX 4.3 Network Hardening
AIX 4.3 Network Hardening- Recipes to secure network services on AIX. Download of scripts available. ...
Absence of Malice
Absence of Malice- Editorial from Dr. Dobb's Journal about Randal Schwartz's felony convictions for running Crack on unauthorized machines. ...
Unix Security
Unix Security- Paper by Rajib K. Mitra about file permissions, daemons, stack overflows and scripts. ...
Securing Debian HOWTO
Securing Debian HOWTO- Protecting Debian during installation and securing network services. ...
Auditing UNIX Systems: A Case Study
Auditing UNIX Systems: A Case Study- This report, written as a case study, presents results of a detailed information security audit of UNIX systems that belong to a fictitious company. It illustrates an approach to perf ...
Secure Programming for Linux and Unix HOWTO
Secure Programming for Linux and Unix HOWTO- Online book on software security tips. ...
TPEP Frequently Asked Questions
TPEP Frequently Asked Questions- The Computer Security Evaluation Frequently Asked Questions (V2.1) ...
Unix security basics, Part 1
Unix security basics, Part 1- Understanding file attribute bits and modes ...
Secure UNIX Programming FAQ
Secure UNIX Programming FAQ- Definitions of security holes, security principles, how to access files safely, and untainting input. ...
Writing Safe Setuid Programs
Writing Safe Setuid Programs- Collection of papers on writing safe setuid programs by Matt Bishop. ...
Raw IP Networking FAQ
Raw IP Networking FAQ- Thamer Al-Herbish's Raw IP Networking FAQ about networking below TCP/UDP and sniffing networks. Includes raw socket source code. ...
SecurityFocus mailing lists archive
SecurityFocus mailing lists archive- Hosts the BUGTRAQ mailing list and other Sun/Linux security mailing lists. ...
Computer Security Basics
Computer Security Basics- Describes complicated concepts like trusted systems, encryption, and mandatory access control in simple terms. ...
Practical UNIX & Internet Security, 3rd edition
Practical UNIX & Internet Security, 3rd edition- Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD. Includes table of contents, errata, and sample chapter ...
NIST Cerberus, An IPsec Reference Implementation for Linux
NIST Cerberus, An IPsec Reference Implementation for Linux- News, descriptions and contact information ...
Deception Toolkit
Deception Toolkit- Make your system seem to have network security bugs, and log attack attempts. ...
FakeBo
FakeBo- Fakes trojan servers (Back Orifice, NetBus) and logs every attempt from client. ...
Samhain
Samhain- A tool for file integrity checking that optionally can be used as a client/server application for centralized monitoring of networked hosts. ...
TCP Wrappers and other security tools
TCP Wrappers and other security tools- Security tools and papers. A website by Wietse Venema. ...
Flawfinder
Flawfinder- Examines source code looking for security weaknesses. ...
Cyber Security and Information Infrastructure Protection
Cyber Security and Information Infrastructure Protection- Practical measures for critical infrastructure protection, intrusion prevention and threat assessment. ...
Guarded Memory Move (GMM)
Guarded Memory Move (GMM)- The GMM library can be used to prevent and study buffer overflows exploits ...
Bash Prompt HOWTO
Bash Prompt HOWTO- How-to reference guide to customizing the BASH command-line prompt. ...
BASH FAQ
BASH FAQ- A BASH Frequently Asked Questions Page ...
Learning the shell
Learning the shell- Collection of Linux command-line tutorials, focused on the BASH shell. ...
Setting environment variables: BASH shell
Setting environment variables: BASH shell- HOWTO change environment variables under the BASH shell. ...
Setting the prompt variable: BASH shell
Setting the prompt variable: BASH shell- HOWTO change the prompt variable under the BASH shell. ...
Working more productively with Bash 2.x
Working more productively with Bash 2.x- BASH tips and tricks - including programmable command-line completion. ...
GNU Bash Reference Manual
GNU Bash Reference Manual- The "GNU Bash Reference Manual" by Chet Ramey and Brian Fox, available as a printed book (ISBN: 0-9541617-7-7). ...
Bash Reference Manual
Bash Reference Manual- GNU BASH shell reference manual. Readable online or optionally download in a variety of formats. ...
Getting Started with Bash :: A Bash Tutorial
Getting Started with Bash :: A Bash Tutorial- A bash shell tutorial that covers the most useful aspects and features of bash for the average user, rather than the scripter/programmer. ...
GNU BASH
GNU BASH- Official site for the GNU Bourne Again SHell. Includes manual and links to download bash binaries and source. ...
Bash Scripting Tutorial
Bash Scripting Tutorial- A basic introduction to scripting with Bash. ...
The GNU Bourne-Again Shell
The GNU Bourne-Again Shell- The GNU Project BASH Maintainer's home site. ...
« First
Previous
Page 457 of 465.
Next
Last »
Latest sites from Software
Eploy
Sweep
Luke's Website
Qtractor
Ocenaudio
Symantec Removal Tools
AVG Free Edition
Free Data Recovery
Object Fix Zip
LocTeam
DigiPad
IBM Smarter Workforce
iApplicants
Localization World
I18n Guy
Anim8or
INUS Technology
Digital Juice
Polhemus
Color Schemer
Action3D Reducer
OpenACS
onShore
Abacus Systems Pty Ltd.
Advosol Inc.
Send feedback
submit