Archive

Archive for the ‘IT-Tools’ Category

Fiaif

May 25th, 2007
Comments Off on Fiaif

FIAIF is an Intelligent Firewall. It provides a highly customizable script for setting up an iptables-based firewall. Configuration is done through one configuration file for each network to which the firewall is connected. FIAIF supports masquerading, port forwarding, traffic shaping, and more.

Uncategorized

FourEyes

May 25th, 2007
Comments Off on FourEyes

FourEyes allows network administrators to enforce a four eyes policy on Windows NT, 2000 and XP by requiring two users to authenticate during a local logon.
Read more…

Uncategorized

GeSWall

May 25th, 2007
Comments Off on GeSWall

With GeSWall, you can safely surf the web, open e-mail attachments, chat, exchange files etc, regardless of the security threats posed by the internet. GeSWall protects you from intrusions and malicious software by isolating vulnerable applications. Isolation applies an access restriction policy that effectively prevents all kinds of attacks, known and unknown.
Read more…

Uncategorized

BeEF – Browser Exploitation Framework

May 25th, 2007
Comments Off on BeEF – Browser Exploitation Framework

BeEF is the browser exploitation framework. Its purposes in life is to provide an easily integratable framework to demonstrate the impact of browser and cross-site scripting issues in real-time. The modular structure has focused on making module development a trivial process with the intelligence existing within BeEF.

Uncategorized

Argos – Emulator for Zero-Day Attacks

May 25th, 2007
Comments Off on Argos – Emulator for Zero-Day Attacks

Argos is a full and secure system emulator designed for use in Honeypots. It is based on QEMU, an open source processor emulator that uses dynamic translation to achieve a fairly good emulation speed.
Read more…

Uncategorized

Keygloo

May 25th, 2007
Comments Off on Keygloo

This is a public key based authentication model that works by verifying whether the user is in posession of his private key. The user should have Keygloo installed in his system for authenticating himself into any Keygloo enabled web application.
Read more…

Uncategorized

IPSecuritas

May 25th, 2007
Comments Off on IPSecuritas

IPSecuritas lets you easily setup IPSec VPN connections to another host or network over the Internet, while securing your data by encryption and authentication. This way, you can easily and cheaply access your office network from any point of this world, always knowing your communication is safe and protected from others.
Read more…

Uncategorized

UserLock: Manage Networks Access Control

May 25th, 2007
Comments Off on UserLock: Manage Networks Access Control

UserLock is a Windows network security utility that secures access to networks by restricting simultaneous sessions, by limiting user access to network resources and by providing network administrators with remote control and session analysis.
Read more…

Uncategorized

strongSwan

May 25th, 2007
Comments Off on strongSwan

strongSwan is an OpenSource IPsec implementation for the Linux operating system. It is based on the discontinued FreeS/WAN project and the X.509 patch which we developped over the last three years. In order to have a stable IPsec platform to base our future extensions of the X.509 capability on, we decided to lauch the strongSwan project.
Read more…

Uncategorized

Centron Firewall Iptables GUI Client

May 25th, 2007
Comments Off on Centron Firewall Iptables GUI Client

The Centron IPTables Firewall Gui is an object oriented, database driven, windows interface to linux IPtables firewall rules. The idea is a free Linux based firewall to people who can´t afford expensive commercial grade firewalls and need to have simplified firewall administration.
Read more…

Uncategorized