HOME | MY ACCOUNT | POWER SEARCH | REGISTER | MEMBER LIST | SUGGEST CATEGORY



Top > Security > Admin Tools-Software

Admin Tools-Software

Sort By :
The Coroner's Toolkit (TCT) provides post-break-in data collection that could be useful in determining what happened. Less polished that the authors (Dan Farmer and Wietse Venema) usual work, the toolkit offers a patch-work of tools that help exhume interesting stuff from violated systems. Should be installed and examined before a break-in happens!
Category:

Random Site Quote: The Coroner's Toolkit (TCT) TCT is a collection of programs by Dan Farmer and Wietse Venema for a post-mortem analysis of a UNIX system after break-in. The software was presented first in a Computer Forensics Analysis class in August 1999 (handouts can be found here ). Examples of using TCT can
For detailed information visit the website, please...

Date Added: Jun 2, 2009 Hits: Rating: 0.00 Votes: 0

Member Reviews Visitor Ratings Google PR

12. lsof
lsof is a tool for examining I/O channels open on your Unix system. These can include files, FIFOs and network sockets. This information can be extremely useful for security and a variety of other purposes. Works on most Unix-like systems.
Category:

Random Site Quote: Lsof is a Unix-specific diagnostic tool. Its name stands for LiSt Open Files, and it does just that. It lists information about any files that are open by processes currently running on the system. It can also list communications open by each process. Changes: This release updates the Darwin
For detailed information visit the website, please...

Date Added: Jun 2, 2009 Hits: Rating: 0.00 Votes: 0

Member Reviews Visitor Ratings Google PR

SUS is a utility to allow a user (typically a system administrator) to run a single command as the super user.
Category:

Random Site Quote: SUS is a utility to allow a user of a UNIX type system to run a command as another user, usually the super user. It is typically used as a system administration tool to allow system administrators to temporarily raise their privilage level for a single task but also to give other users the
For detailed information visit the website, please...

Date Added: Jun 2, 2009 Hits: Rating: 0.00 Votes: 0

Member Reviews Visitor Ratings Google PR

Execute root-level commands and shell scripts without having to actually login as root. Control which users can log in and under which circumstances.
Category:

Random Site Quote: Symark’s PowerSeries™ Identity and Access Management products provide an ideal solution for creating a secure access control infrastructure across your heterogeneous IT portfolio that both improves security and supports compliance while reducing the costs associated with systems
For detailed information visit the website, please...

Date Added: Jun 2, 2009 Hits: Rating: 0.00 Votes: 0

Member Reviews Visitor Ratings Google PR


Pages: [< Previous] 1 2

Category Jump :
Popular Tags


Main Category
Pagerank Statistics
PR 8
1 site(s)
PR 7
1 site(s)
PR 6
7 site(s)
PR 5
7 site(s)
PR 4
9 site(s)
PR 3
9 site(s)

Directory Statistics

Links: 698
Categories: 118


Top 10