pam_usbng [Linux USB Authentication]
A simple and quick step-by-step guide to getting started in a few minutes ... If you are a developer or like to contribute otherwise, this is your section ...
http://usbauth.delta-xi.net/doku.php
popularity:
security
usb
linux
pam
authentication
tools
sysadmin
free
|
Hping - Active Network Security Tool
A network scanner that uses spoofed source address packets. ... hping is a command-line oriented TCP/IP packet assembler/analyzer. ...
similarity:
popularity:
security
network
tools
networking
software
hacking
tool
linux
hping
sysadmin
|
Center for Internet Security - Standards
The Center for Internet Security is a non-profit enterprise that helps organizations reduce the risk of business and e-commerce disruptions resulting from inadequate ...
similarity:
popularity:
security
hardening
internet
reference
tools
windows
linux
network
standards
software
|
Fail2ban
Manual (Official Fail2ban documentation) ... Retrieved from "http://www.fail2ban.org/wiki/index.php/Main_Page" Views. Page. Discussion ...
similarity:
popularity:
security
linux
firewall
iptables
sysadmin
software
ssh
unix
opensource
tools
|
FireHOL, a Linux iptables packet filtering firewall builder for humans...
Home for FireHOL, an iptables stateful packet filtering firewall builder for Linux (kernel 2.4), supporting NAT, ... Served by. Sourceforge. SF Home. FM ...
similarity:
popularity:
linux
firewall
security
iptables
networking
sysadmin
software
network
firehol
tools
|
The Metasploit Project
The Metasploit Framework is the open source penetration testing framework with the world's largest database of public, tested exploits.
similarity:
popularity:
security
hacking
tools
exploit
software
network
opensource
hack
exploits
linux
|
TrueCrypt - Free Open-Source On-The-Fly Disk Encryption Software for Windows Vista/XP, Mac OS X and Linux
Open source on-the-fly disk encryption software for Windows XP/2000 and Linux.
similarity:
popularity:
security
encryption
software
opensource
tools
cryptography
windows
linux
freeware
privacy
|
LogAnalysis.Org
Info aimed at detecting intrusions, but also good general log analysis tips. ... Welcome to LogAnalysis. Log Analysis is one of the great overlooked aspects of ...
similarity:
popularity:
security
logging
sysadmin
log
analysis
monitoring
linux
unix
syslog
tools
|
Tinfoil Hat Linux
A secure single floppy linux. For the paranoid among us. ... If you maintain a PGP Certificate Authority or signing key and have to have a safe place to use the CA key. ...
similarity:
popularity:
linux
security
privacy
software
distro
pgp
tools
encryption
cryptography
tinfoil
|
Firestarter
A graphical interfaced Open Source firewall for Linux. ... Linux security does not have to be complex, and simplicity does not have to mean sacrificing power. ...
similarity:
popularity:
linux
firewall
security
software
opensource
tools
network
networking
ubuntu
iptables
|
SystemRescueCd homepage
Live CD for repairing your system and recovering your data after a crash. ... Retrieved from "http://www.sysresccd.org/Main_Page" Views. Personal tools. Log in. main ...
similarity:
popularity:
linux
livecd
rescue
tools
software
recovery
sysadmin
opensource
backup
security
|