Semantic search

Jump to: navigation, search

Edit query Show embed code

The query [[Security::system]] was answered by the SMWSQLStore3 in 0.0081 seconds.

Results 11 – 30    (Previous 20 | Next 20)   (20 | 50 | 100 | 250 | 500)   (JSON | CSV | RSS | RDF)

Scans log files and emails infected hosts
ryptsetup is utility used to conveniently setup disk encryption based on dm-crypt kernel module, including plain dm-crypt volumes, LUKS volumes, loop-AES and TrueCrypt compatible format. Cryptsetup is backwards compatible with the on-disk format of cryptoloop, but also supports more secure formats. This package includes support for automatically configuring encrypted devices at boot time via the config file /etc/crypttab. Additional features are cryptoroot support through initramfs-tools and several supported ways to read a passphrase or key.
dsacheck is a python program that will check all the packages on a Debian system. Dsacheck will download dynamically the DSA (Debian Security Alert) news from the security webpage and build a list that will be compared to the locally installed packages. You can use it easily in a CRON job.
Easy integrity check system is an easy-to-install and use file integrity system. It is meant to be used by system administrators to aid with intrusion detection.
EncFS is an encrypted pass-through filesystem which runs in userspace on GNU/Linux (using the FUSE kernel module). Similar in design to CFS and other pass-through filesystems, all data is encrypted and stored in the underlying filesystem. Unlike loopback filesystems, there is no predetermined or pre-allocated filesystem size.
Fenris is a multipurpose tracer, GUI debugger, stateful analyzer and partial decompiler intended to simplify bug tracking, security audits, code, algorithm, protocol analysis and computer forensics - providing a structural program trace, interactive debugging capabilities, general information about internal constructions, execution path, memory operations, I/O, conditional expressions and more. Fenris can do traditional, instruction by instruction or breakpoint to breakpoint interactive debugging enhanced by additional structural data about the code delivered to the user; it is able to fingerprint functions in static binaries, reconstruct symbol tables in ELF files based on that information, automatically detect common library code; able to deliver text-based and graphical, browsable output that documents different aspects of program activity on different abstraction layers; able to perform partial analysis of single structural blocks.
File Integrity Command & Control (FICC) helps system administrators manage multiple Tripwire installations. It maintains MD5 hashes for three key Tripwire files and verifies that the MD5 checksum of these key files against the signatures in its file checksum database. If they match, it then connects to the host via SSH and runs Tripwire. If any signatures do not match, an email is sent to the "FICC administrator" of the system in question.
This is a candidate for deletion: broken links, can't find elsewhere, not on, my email to maintainer was returned to sender. Danm (talk) 14:19, 1 November 2017 (EDT) GSsh is a Gnome frontend to ssh. It keeps track of the hosts you visit and remembers the username, so logging in is only a few mouse clicks away. Most of ssh's command line parameters can be set from a settings dialog.
gnoMint is a tool for easily creating and managing certification authorities. It provides fancy visualization of all the pieces of information that pertain to a CA, such as x509 certificates, CSRs, and CRLs. gnoMint is currently capable of managing a CA that emits certificates that are able to authenticate people or machines in VPNs (IPSec or other protocols), secure HTTP communications with SSL/TLS, authenticate and cipher HTTP communications through Web-client certificates, and sign or crypt email messages.
'grsecurity' is a complete security system for Linux 2.4 that implements a detection/prevention/containment strategy. It prevents most forms of address space modification, confines programs with least privilege via its process-based ACL system, hardens syscalls, and provides many of the OpenBSD randomness features. It has auditing capabilities and a netfilter module designed to thwart portscans and OS fingerprinting.
Gvpe Heckert gnu.tiny.png
gvpe is a suite designed to provide a virtual private network for multiple nodes over an untrusted network. It works by creating encrypted host-to-host tunnels between multiple endpoints. GVPE (GNU VPE) is an acronym standing for GNU Virtual Private Ethernet.
Hashlet is an application with a Command Line Interface (CLI) that controls the Cryptotronix Hashlet. The Cryptotronix Hashlet is open source hardware that implements SHA256, provides a hardware random number generator, and stores 256 bit keys in read and write protected memory. The hardware is designed for a BeagleBone Black but can be uses on an embedded GNU/Linux system that supports the I2C protocol and can supply 3.3 or 5 Volts to the device
'Hping' sends custom ICMP/UDP/TCP packets and displays target replies. It handles fragmentation and arbitrary packet body and size, and can be used to transfer files under supported protocols. With 'Hping', you can test firewall rules, perform [spoofed] port scanning, test net performance using different protocols, packet size, TOS (type of service), and fragmentation, do path MTU discovery, tranfer files (even between really Fascist firewall rules), perform traceroute-like actions under different protocols, fingerprint remote OSs, and audit a TCP/IP stack.
IP Sentinel
'IP Sentinel' is a tool that tries to prevent unauthorized usage of IP addresses within an ethernet broadcast domain by answering ARP requests. After receiving faked replies, requesting parties store the MAC in their ARP tables and will send future packets to this invalid MAC, rendering the IP unreachable.
This is a candidate for deletion: broken links, can't find software elsewhere, software not on, developer said via email that it can be deleted. Danm (talk) 12:53, 29 October 2017 (EDT) IPFC is software and a framework to manage and monitor multiple types of security modules across a global network. Modules can be packet filters (like netfilter, pf, ipfw, IP Filter, checkpoint FW1, etc.), NIDS (Snort, arpwatch, etc.), Web servers, or other general devices (from servers to embedded devices). It features log collection for different security "agents", dynamic log correlation possibilities, and easy extensibility due to the generic database and XML message formats used.
FreeSpeechMe is a Free Software plug-in for IceCat that allows people to effortlessly view Dot-Bit websites. It works on GNU/Linux and Windows. Dot-Bit (.bit) is a new top-level domain that, unlike Dot-Com, Dot-Net, Dot-UK, etc., is NOT controlled by any government or corporation. FreeSpeechMe works over the distributed blockchain of the inexpensive cryptocurrency, Namecoin (a derivative of BitCoin). Namecoin is not generally traded as currency. It exists primarily for the purpose of decentralized DNS. Domains currently cost about 10 cents US of Namecoin to register. Before FreeSpeechMe, viewing Dot-Bit websites required changing DNS settings, and using non-vetted public DNS servers. FreeSpeechMe doesn't require changing DNS settings, so it is much more secure. Newly registered Dot-Bit websites can be viewed within three hours worldwide with FreeSpeechMe. IP or Nameserver update changes to an existing Dot-Bit website are viewable worldwide within 40 minutes. This isn't just "a plug-in." FreeSpeechMe, Dot-Bit and Namecoin are a complete new Internet ecosystem, free of the constraints of ICANN and the like. Please see tech FAQ for full list of improvements and implementations we're planning on for FreeSpeechMe and Namecoin:
Homepage has new owner. Links broken. Homepage redirected to entry. Email to maintainer broken. Poppy-one (talk) 13:20, 5 August 2018 (EDT) 'incident'.pl is a small script that, when given syslogs generated by snort or other tools, can generate an incident report for events that appear to be attempted security attacks, gather information on the remote host, and report the attack to the appropriate administrators.
Integrit is an alternative to file integrity verification programs like tripwire and aide. It helps you determine whether an intruder has modified a computer system. It creates a database that is a snapshot of the essential parts of your computer system. You put the database somewhere safe, and then use it to make sure that no one has made illicit modifications to the computer system. If there's a break in, you know exactly which files have been modified, added, or removed. Current features include a small memory footprint, a simple and modular design (for a faster learning curve), up-to-date cryptographic algorithms, cascading rulesets, output that can be XML or a human-readable form that can be scanned, an option to reset access times, simultaneous check and update, and a design that is meant for unattended use.
Linux Security Auditing Tool (LSAT) is a post install security auditing tool for systems using the Linux kernel. It is modular in design, so new features can be added quickly. It checks many system configurations and local network settings on the system for common security/config errors and for unneeded packages.
Laplock, Lock my computer with a SD-Card! Laplock does not only save your laptop, but will also save your files. The Idea: A special SD-Card in your box and anything will run just normal to work with. Pull out the card (someone is knocking at the door) and the box is locked, so there is no way to access it anymore. Furthermore the laptop will not start if the card is not inside. Quite important, if the laptop "gets lost" for some reason.

Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the page “GNU Free Documentation License”.

The copyright and license notices on this page only apply to the text on this page. Any software or copyright-licenses or other similar notices described in this text has its own copyright notice and license, which can usually be found in the distribution or license text itself.