what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 1999-10-27

libol-0.2.5.tar.gz
Posted Oct 27, 1999
Authored by Balazs Scheidler

Libraries needed to compile syslog-ng-1.2.0.

tags | system logging
systems | unix
SHA-256 | cf62f99181ce6086b6b417cf622da52637e25fcaf5aeffe37d27215acb7ecfbc
syslog-ng-1.2.0.tar.gz
Posted Oct 27, 1999
Authored by Balazs Scheidler

Syslog-ng as the name shows is a syslogd replacement, but with new functionality for the new generation. The original syslogd allows messages only to be sorted based on priority/facility pair, syslog-ng adds the possibility to filter based on message contents using regular expressions. The new configuration scheme is intuitive and powerful.

Changes: A new stable series started with this release. Version 0.2.5 of libol is required to compile syslog-ng now.
tags | system logging
systems | unix
SHA-256 | 7688e47e094bd096ad063d2888408cd6b23e11fcb32bf36ebb18433f917f4576
ftpcheck.pl
Posted Oct 27, 1999
Authored by David Weekly | Site david.weekly.org

Ftpcheck version 0.32 scans hosts and networks for FTP and anonymous FTP archives. It was written as a security analysis tool. ftpcheck is very fast. It can effectively scan a class C network for anonymous FTP sites in less than 5 seconds. It does this by starting a new process for each connection. ftpcheck requires perl and libnet (from CPAN).

Changes: Fixed misclassification of "a.b.c" hostnames as class C IP addresses.
tags | tool, scanner, perl
systems | unix
SHA-256 | 4db18ee847594c54327e7cbf9a06f2931d9e5950e20b2ba32d3e0d93b52e29c0
tailbeep-0.43.tar.gz
Posted Oct 27, 1999
Authored by Tommy. | Site soomka.com

Tailbeep opens a file (-f), seeks to the end, and watches for a string (-s). If the string is found, a beep is sent to the specified tty (-t) device. You can also daemonize (-d) it. I wrote it so I could watch /var/log/messages for the DENY string (so I can tell if someone is trying to break into the firewall).

Changes: Added -F (frequency) and -M (milliseconds) option, added -x "command" option, cleaned up the help screen, and you can use -p and -P at the same time now if you want both the entire line and a predefined message.
tags | tool, intrusion detection
systems | unix
SHA-256 | f48d24516c0e62148cbb782e1cb62c1b16b0c0a4f5d49100f27fe7568d015b5a
linux-2.0.38-ow4.tar.gz
Posted Oct 27, 1999
Site openwall.com

This patch (for kernel version 2.0.38) is a collection of security-related features for the Linux kernel, all configurable via the new 'Security options' configuration section. In addition to the new features, some versions of the patch contain various security fixes. The number of such fixes changes from version to version, as some are becoming obsolete (such as because of the same problem getting fixed with a new kernel release), while other security issues are discovered.

tags | kernel
systems | linux
SHA-256 | bac133254280a1004601ee0378499f2384700b2c51e1280c5877c6d220d8550d
Openwall Linux Kernel Patch
Posted Oct 27, 1999
Site openwall.com

This patch (for kernel version 2.2.13) is a collection of security-related features for the Linux kernel, all configurable via the new 'Security options' configuration section. In addition to the new features, some versions of the patch contain various security fixes. The number of such fixes changes from version to version, as some are becoming obsolete (such as because of the same problem getting fixed with a new kernel release), while other security issues are discovered.

tags | kernel
systems | linux
SHA-256 | 950f913dd4c3cb5fc0e1ab946fc132fef8d3e674b058a9d8aef8258d476418c8
cracking2.txt
Posted Oct 27, 1999
Authored by Techlord | Site blacksun.box.sk

Techlord's second cracking tutorial. This one will guide you through the cracking process of a small program, and help you under stand all the steps involved in cracking.

SHA-256 | e803f72a65f8cc8dcb206d3258ec9d4593fa5d20dc608d7cde6804d8f708540d
suidshow.c
Posted Oct 27, 1999

suidshow.c is a linux lkm that will log any non-root user doing a setuid(0) or a setreuid(0,0) system call. CyberPsychotic

tags | tool, root, intrusion detection
systems | linux, unix
SHA-256 | 5089cc902d75283bd99aa843ad384439e5b1b862509c70dfa40b9ccae967e300
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    0 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close