exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2001-01-03

SSHWin-2.4.0.exe
Posted Jan 3, 2001
Site ssh.org

SSH (Secure Shell) Windows Port is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another, providing strong authentication and a secure communications over insecure channels.

Changes: Bug fixes and improvements.
tags | remote, shell, encryption
systems | windows
SHA-256 | 7ddba53dcf1a1a9503ca06a93b44c863b34e487daf6d252e8f0abf69940b8f27
ssh-2.4.0.tar.gz
Posted Jan 3, 2001
Site ssh.org

SSH (Secure Shell) is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another, providing strong authentication and a secure communications over insecure channels.

Changes: Added Cast-128 cipher, implemented FTP forwarding (secure tunnels are created on the fly for data connections and port numbers are spoofed), implemented RSA SecurID authentication, implemented PAM authentication, and bug fixes.
tags | remote, shell, encryption
SHA-256 | 95cece99986eec8f550ae0ba78457254e725b88282fe2f3337b5308db23a84d5
SSHWinServer.exe
Posted Jan 3, 2001
Site ssh.com

SSH v2.4.0 server for Windows.

tags | encryption
systems | windows
SHA-256 | a374fb7c91cbb9beb34130128b5a55da475b161d224643043e1a4c2479654856
hypersrc-2.1.6.tar.gz
Posted Jan 3, 2001
Authored by Jim Brooks | Site jimbrooks.org

hypersrc is a GUI program for browsing source code, which uses GTK+. It provides a list widget containing sorted source code tags. A programmer can click a tag to hyperlink to a particular tagged line in a source code file. Screenshot here.

Changes: Fixed all known segfaults.
systems | linux
SHA-256 | e207046f65bd61093049aee58e950c824eef84f69463e5a7db0db8d22e977399
zorp-0.7.10.tar.gz
Posted Jan 3, 2001
Authored by Balazs Scheidler | Site balabit.hu

Zorp is a new-generation modular proxy firewall suite to fine tune proxy decisions with its built in script language, fully analyze complex protocols (like SSH with several forwarded TCP connections), and utilize outband authentication techniques (unlike common practices where proxy authentication had to be hacked into the protocol).

Changes: Ipchains support to add and remove rules at runtime was added, and bugfixes were included.
tags | tool, tcp, firewall, protocol
systems | unix
SHA-256 | b6d5141db75b7f9d6917a814374ff4b2765e6e1a37d694d1faef0c8720bc0705
idsa-0.88.tar.gz
Posted Jan 3, 2001
Site cs.uct.ac.za

IDS/A is an experimental interface between applications and a daemon which functions as system logger, reference monitor, and soon intrusion detection system. IDS/A is not yet complete, but can already be used as system log replacement with extra neat features such as automatic log rotation. It also ships with two example applications which demonstrate how the system can be used to block basic banner grabbing port or CGI scanners.

Changes: This release adds a pam module and a guile interface. It is now possible to write scheme programs to process, correlate and block events. A number of bugs have also been squashed and some internals have been rewritten, probably introducing new bugs.
tags | cgi, system logging
systems | unix
SHA-256 | 366dd2570a9d7e58748d70377398edff1a1da47522e07fbfa4b80dc6e628c3c2
firelogd-1.3.tgz
Posted Jan 3, 2001
Site speakeasy.org

Firewall Log Daemon provides two programs, chaindaemon and tabledaemon, that you can choose between, depending on your firewall type (ipchains or iptables-netfilter). The program will start a small daemon process that parses and resolves firewall logs in real-time by reading a FIFO that syslog writes to. It will queue a batch of alerts and mail them to you. It features hostname, port, protocol, and ICMP type/code lookup, with formatted output for easy reading.

Changes: All fields in packet log are now captured and decoded, turning all hex values into their corresponding ascii bit strings. The included "decode.php" and corresponding template provides for a web-based log entry decoder. Various bugfixes.
tags | tool, firewall, protocol
systems | linux
SHA-256 | bde28ec499125eba35e9b5e2c151d4ad6f002ba0e1fb00eb4abc47dd73cbd088
lomac-v1.0.tar.gz
Posted Jan 3, 2001
Site pgp.com

LOMAC is a security enhancement for Linux that uses Low Water-Mark Mandatory Access Control to protect the integrity of processes and data from viruses, Trojan horses, malicious remote users, and compromised root daemons. LOMAC is implemented as a loadable kernel module - no kernel recompilations or changes to existing applications are required. Although not all the planned features are currently implemented, it presently provides sufficient protection to thwart script-kiddies, and is stable enough for everyday use. Whitepaper available here.

Changes: First stable release! Includes a new manual, performance benchmarks, and bug fixes.
tags | remote, kernel, root, trojan
systems | linux
SHA-256 | e8698893749ac051296933821316469e9422a47ca94bb7b97b4f748fbffa1d72
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    0 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close