HOME | MY ACCOUNT | POWER SEARCH | REGISTER | MEMBER LIST | SUGGEST CATEGORY



Top > Security > Protection

Protection

Sort By :
Make your system seem to have network security bugs, and log attack attempts.
Category:

Random Site Quote: Specializing in Information Protection Since 1977 The Deception Toolkit Home Page and Mailing List Our mission is to discuss issues surrounding deception and the deception toolkit from the definition of what it is to how to do it and everywhere Rule 1: The mailing list is fully moderated and the
For detailed information visit the website, please...

Date Added: Jun 2, 2009 Hits: Rating: 0.00 Votes: 0

Member Reviews Visitor Ratings Google PR

Fakes trojan servers (Back Orifice, NetBus) and logs every attempt from client.
Category:

Random Site Quote: "...its not enough that Linux has stable and secure networking, it's able to emulate the bugs in other platforms... " What is use of this program? This program fakes trojan servers and logs every attempt from client. It is possible to log attempts to file, stdout, stderr or to syslog. It can
For detailed information visit the website, please...

Date Added: Jun 2, 2009 Hits: Rating: 0.00 Votes: 0

Member Reviews Visitor Ratings Google PR

A tool for file integrity checking that optionally can be used as a client/server application for centralized monitoring of networked hosts.
Category:

Random Site Quote: The SAMHAIN file integrity / host-based intrusion detection system host-based intrusion detection system (HIDS) provides and logfile monitoring/analysis, as well as rootkit detection, port monitoring, detection of rogue SUID executables, and hidden processes. It has been designed to monitor
For detailed information visit the website, please...

Date Added: Jun 2, 2009 Hits: Rating: 0.00 Votes: 0

Member Reviews Visitor Ratings Google PR

This is the main FTP site for security tools and papers from Wietse Venema.
Category:

Random Site Quote: This site is located in White Plains, New York, USA. It is kindly Some files have a (separate) PGP signature to protect you against I wrote many of the tools in this archive, but I can't give any warranty on the absence of bugs. Use at your own risk. The Coroner's Toolkit is yet another result
For detailed information visit the website, please...

Date Added: Jun 2, 2009 Hits: Rating: 0.00 Votes: 0

Member Reviews Visitor Ratings Google PR

Examines source code looking for security weaknesses.
Category:

Random Site Quote: David A. Wheeler's Page for Flawfinder
This is the main web site for flawfinder , a program that examines source code and reports possible security weaknesses (``flaws'') It's very useful for quickly finding and removing at least some potential security problems before a program is widely released below, for more information on how

Date Added: Jun 2, 2009 Hits: Rating: 0.00 Votes: 0

Member Reviews Visitor Ratings Google PR

Practical measures for critical infrastructure protection, intrusion prevention and threat assessment.
Category:

Random Site Quote: Center for Information Technology Integration Cyber Security and Information Infrastructure Protection The primary aim of this research is to improve cyber security and to increase information infrastructure protection by making our information infrastructure more resilient against attacks. We
For detailed information visit the website, please...

Date Added: Jun 2, 2009 Hits: Rating: 0.00 Votes: 0

Member Reviews Visitor Ratings Google PR

The GMM library can be used to prevent and study buffer overflows exploits
Category:

Random Site Quote: Memory Move (GMM) Home Page The Guarded Memory Move tool gets handy when you have to study buffer overflows and you need to catch them together with a "good" stack When a stack overflow has been exploited, the back trace is already together with good information about parameters and local
For detailed information visit the website, please...

Date Added: Jun 2, 2009 Hits: Rating: 5.00 Votes: 1
Top Rated

Member Reviews Visitor Ratings Google PR

Free software (GNU license) from Bell Labs for protecting internet servers from buffer overflow attacks, one of the most commonly exploited security vulnerabilities.
Category:

Random Site Quote: Protecting Critical Elements of Stacks The exploitation of buffer overflow and format string vulnerabilities in process stacks constitutes a significant portion of security attacks in recent years. We present a new method to detect and handle such attacks. In contrast to previous work, our method
For detailed information visit the website, please...

Date Added: Jun 2, 2009 Hits: Rating: 5.00 Votes: 1
Top Rated

Member Reviews Visitor Ratings Google PR


Category Jump :
Popular Tags


Main Category
Pagerank Statistics
PR 8
1 site(s)
PR 7
1 site(s)
PR 6
7 site(s)
PR 5
7 site(s)
PR 4
9 site(s)
PR 3
9 site(s)

Directory Statistics

Links: 698
Categories: 118


Top 10