DarwinsWeb
Home Categories Mission Statement Contact Info Submit Site Register Sign In
Bookmark This Page (press ctrl d)
Category: Top / Computers / Software / Operating Systems / Unix / Security /

Admin Tools-Software



Websites  
Click here to submit your site immediately!
North American Cryptography Archives
cryptography.org
Strong cryptographic software, libraries, and information about cryptography, data security, and privacy. keywords: secrecy, cryptology, cryptanalysis, codes, ciphers
Rank: 0.0/5
reviews(0)
Votes: 0
LBNL's Network Research Group
www-nrg.ee.lbl.gov/nrg.html
Tools such as tcpdump and traceroute.
Rank: 0.0/5
reviews(0)
Votes: 0
SAINT
www.wwdsi.com/saint/
(Security Administrator's Integrated Network Tool) Scans systems and networks and reports potential vulnerabilities.
Rank: 0.0/5
reviews(0)
Votes: 0
OpenSSL
www.openssl.org/
The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, fully featured, and Open Source toolkit implementing the Secure Sockets Layer and Transport Layer Security protocols with full-strength cryptography world-wide.
Rank: 0.0/5
reviews(0)
Votes: 0
mcrypt
hq.hellug.gr/~mcrypt
A replacement for the unix crypt, using several block algorithms in several modes like cbc, and cfb. keywords: encryption, twofish, serpent, rijndael, rc6, rc2, library, gost, cast, blowfish
Rank: 0.0/5
reviews(0)
Votes: 0
Sudo
www.sudo.ws/
Run selected commands as root, with the users' own password. Allows the administrator to grant limited root privileges to a subset of users, without giving out the root password.
Rank: 0.0/5
reviews(0)
Votes: 0
Pidentd
ftp.lysator.liu.se/pub/ident/servers/
Daemon implementing IDENT protocol, it can be used to identify the user who initiated a TCP/IP connection
Rank: 0.0/5
reviews(0)
Votes: 0
sudoscript
www.egbok.com/sudoscript
A pair of Perl scripts that provide an audited root shell using sudo and script(1). Tarballs, RPM's and individual components.
Rank: 0.0/5
reviews(0)
Votes: 0
OpenSSH - Portable Distribution
www.openssh.org/portable.html
Open source implementation of SSH1 and SSH2 protocols. Ported from OpenBSD by the OpenSSH portability team. keywords: goals
Rank: 0.0/5
reviews(0)
Votes: 0
GNU Privacy Guard
www.gnupg.org/
OpenPGP (RFC2440) implementation from the GNU project. Encrypts/decrypts/signs/digests files using strong cryptography. FAQ, downloads, documentation. keywords: page, home, gpg4win, gpg, gnupg, aegypten
Rank: 0.0/5
reviews(0)
Votes: 0
Postfix Mail Transfer Agent
www.postfix.org
Drop-in Sendmail replacement by Wietse Venema. Offers several features that make it difficult to crack.
Rank: 0.0/5
reviews(0)
Votes: 0
Tripwire Inc.
www.tripwire.com/
Commercial version of the original Unix file integrity scanner. Calculates and stores signatures of file permissions, ownership and contents. Scans the same files later, detecting changes. keywords: control, configuration
Rank: 0.0/5
reviews(0)
Votes: 0
Tripwire Open Source
www.tripwire.org
Open source version of the original Unix file integrity scanner. Calculates and stores signatures of file permissions, ownership and contents. Scans the same files later, detecting changes. This open source version is targeted at Linux systems. keywords: software, enterprise, control, configuration
Rank: 0.0/5
reviews(0)
Votes: 0
NMAP Network Scanner
www.nmap.org/
Efficient stealth port scanner. Downloads, e-mail lists, news. keywords: security, windows, unix, tools, tool, source, software, redhat, portscanner, open
Rank: 0.0/5
reviews(0)
Votes: 0
The Coroner's Toolkit (TCT)
www.porcupine.org/forensics/tct.html
The Coroner's Toolkit (TCT) provides post-break-in data collection that could be useful in determining what happened. Less polished that the authors (Dan Farmer and Wietse Venema) usual work, the toolkit offers a patch-work of tools that help exhume interesting stuff from violated systems. Should be installed and examined before a break-in happens!
Rank: 0.0/5
reviews(0)
Votes: 0
lsof
freshmeat.net/projects/lsof
lsof is a tool for examining I/O channels open on your Unix system. These can include files, FIFOs and network sockets. This information can be extremely useful for security and a variety of other purposes. Works on most Unix-like systems.
Rank: 0.0/5
reviews(0)
Votes: 0
The SUS Home Page
pdg.uow.edu.au/sus/
SUS is a utility to allow a user (typically a system administrator) to run a single command as the super user.
Rank: 0.0/5
reviews(0)
Votes: 0
Symark Software
www.symark.com/products.htm
Execute root-level commands and shell scripts without having to actually login as root. Control which users can log in and under which circumstances. keywords: solutions, password, management, unix, security, privileged, managementaccess, identity, account
Rank: 0.0/5
reviews(0)
Votes: 0



Help build the largest human-edited directory on the web.
Submit a Site - Open Directory Project - Become an Editor

Privacy Policy