Newbies What Next ? News Forums Calendar
Home | Register | News | Forums | Portal Pages | MyLinks | New | Hot | Link Us


 Category Gateway
More Options

LinuxLinks News
 · Beelink S1 Mini PC and Linux – Comedy Gold
 · Fun Packed Open Source Action Games
 · Improve Your Mental Mettle with These Open Source Puzzle Games
 · MOOS Project Viewer 3.2 – Support for Microsoft Project 2016 Files
 · Shuffle the Decks with These Ace Open Source Card Games
 · Have a Blast with Fun to Play Open Source Arcade Style Games
 · Asus Tinker Board – TinkerOS_Debian V2.0.1 (Beta version)
 · Asus Tinker Board – TinkerOS Android – Anything Special?
 · Fun to Play Open Source Turn-Based Strategy Games
 · Fun to Play Open Source Real-Time Strategy Games – Fight for Glory


Latest Links
Endless OS
Olimex Teres I
Manic Digger


Top : Software : Networking : Security : Miscellaneous

Beelink S1 Mini PC and Linux – Comedy Gold
The Beelink S1 is a small, silent mini PC released in August 2017 retailing for around 300 dollars (250 euros). It’s produced by Shenzhen AZW Technology Co Ltd, a Chinese company that focuses on Android smart TV boxes, Intel mini PCs, and home cloud TV boxes.

(Read more)
Piwigo is a photo gallery software for the web, built by an active community of users and developers. Extensions make Piwigo easily customizable. Read more


  • The Sleuth Kit
    The Sleuth Kit (TSK) is a library and collection of command line file and volume system forensic analysis tools that allow you to investigate and analyze volume and file system data. Read more hot
  • 0d1n
    0d1n is a tool for automating customized attacks against web applications.
  • acccheck
    The tool is designed as a password dictionary attack tool that targets windows authentication via the SMB protocol. It is really a wrapper script around the ?smbclient? binary, and as a result is dependent on it for its execution.
  • AIL
    AIL is a modular framework to analyse potential information leaks from unstructured data sources like pastes from Pastebin or similar services or unstructured data streams. AIL framework is flexible and can be extended to support other functionalities to mine sensitive information.
  • AirSAM
    AirSAM is a desktop GUI that compliments the Web based Snort Alert Monitor. AirSAM gives up to date insight into who might be attacking your network. The ultimate goal is to give audio/visual cues right at the time of the attack.
  • alph
    alph implements and analyses historical and traditional c(ai)phers providing a pipe interface in order to encrypt and decrypt block text. The program can be conjuncted with pipes reulting in transparent en-decrypt: Atbash, Caesar, Vigenere, Playfair, and Vernam.
  • AntiExploit
    AntiExploit is a on-access exploit scanner to detect local intruders. It scans for over 3900 suspicious files, has daily database updates, and will act if a file is accessed. It uses the dazuko kernel module, which is also used by clamAV, Amavis, and other virus scanners.
  • Arpoison
    Arpoison is a small utility to send custom ARP packets. It can be used during security assessments and pentests.
  • ARPSpoofDetector
    ARPSpoofDetector performs active and passive detection of ARP spoofing and IP (IPv4) address collision. The program can send healing packets with regular ARP information.
  • attackwatch
    attackwatch analyzes the firewall-output in near-realtime and will run scripts in response to incoming packets that got logged.
  • authforce
    authforce is an HTTP authentication brute forcer. Using various methods, it attempts brute force username and password pairs for a site. It has the ability to try common username and passwords, username derivations, and common username/password pairs.
  • Automated Image and Restore
    Automated Image and Restore (AIR) is a graphical user interface front-end to dd/dc3dd. This tool is designed to make the task of creating forensic images of digital media easier for investigators and incident response personnel. Read more
  • Bluediving
    Bluediving is a Bluetooth pentesting suite. It implements attacks like Bluebug, BlueSnarf, BlueSnarf++, BlueSmack, and features like Bluetooth address spoofing.
  • Bluefog
    Bluefog is an experimental tool designed to create large numbers of phantom Bluetooth devices.
  • BlueProximity
    BlueProximity helps add a little more security to the desktop. It does so by detecting a certain Bluetooth device, most likely a mobile phone, and keeping track of its distance. If it is moved away from the computer and the distance is above a certain level (no measurement in meters is possible) for a given time, it automatically locks the desktop (or starts any other shell command wanted). Once away, the computer awaits its master's return: if the device is nearer than a given level for a set time, the computer unlocks without any interaction (or starts any other shell command wanted).
  • bpf
    bpf is the Berkeley Packet Filter.
  • CaclMgr
    CaclMgr is a security package which enables UNIX users to have control over which user will get which UNIX command or SHELL script to be executed with my privilege.
    CCSAT (Cisco Configuration Security Auditing Tool) is a tool for automated audit of configuration security of large numbers of Cisco routers and switches. The tool is based upon industry best practices, including Cisco, NSA, and SANS security guides and recommendations. It is flexible and can report details down to individual device interfaces, lines, ACLs, and ASs, etc. CCSAT has been tested, and used for real audits, on FreeBSD, Solaris 8 and Linux. It should also work on all other major UNIX platforms (POSIX.2).
  • cgichk
    cgichk is a web vulnerability tool that automatically searches for a series of interesting directories and files on a given site.
  • Cmb
    Cmb is a small utility that creates all the possible combinations from a user mask (that includes wildcards) and dumps them to stdout.
  • containers
    containers is a simple implementation of containers for Linux, making secure containers as easy to create and use as a traditional chroot.
  • Crank
    Crank is short for "CRyptANalysis toolKit". Its overall purpose is to provide a powerful and extensible environment for solving classical (pen-and-paper) ciphers, providing as much automation as possible.
  • cryptmount
    cryptmount is a utility which allows an ordinary user to mount an encrypted filing system on-demand, using the device-mapper infrastructure, but without requiring superuser priveleges. Filing systems can be hosted on either raw block devices or ordinary files, with loopback devices setup automatically.
  • CryptoHawk
    CryptoHawk is a program about cryptography. It can calculate hashes (md2,md4,md5,sha-1,sha-256 and hmac). It can also perform cryptanalysis like frequency analysis for substutition cipher and exhaustive key search for rotation cipher, as well as searching internet databases for md5 hashes.
  • cvechecker
    cvechecker reports about possible vulnerabilities on your system by scanning the installed software and matching the results with the CVE database.
  • DenyHosts
    DenyHosts is a Python program that automatically blocks ssh attacks by adding entries to /etc/hosts.deny. DenyHosts will also inform Linux administrators about offending hosts, attacked users and suspicious logins. Read more
  • DeTraS
    DeTraS provides several tools to track development activities by registering applications that developers use on a X Window session. It also allows you to send collected data to a server and takes care about your privacy.
  • dradis
    dradis is a tool for sharing information during security testing. While plenty of tools exist to help in the different stages of the test, not so many exist to share interesting information captured. When a team of testers is working on the same set of targets, having a common repository of information is esential to avoid duplication of efforts.
  • Dyper
    Dyper is a framework for adding connection tracking and dynamic pinhole capabilities to stock routers/switches that allows multiport protocol communication to be maintained with other sites under least privilege while achieving maximum performance.
  • EsteidUtil
    EsteidUtil is a wxWidgets GUI tool for managing the Estonian ID smartcard. It allows the user to see the data on th card, change PINs, and perform some basic diagnostics both on card and necessary opsys configuration. The code has useful low-dependency C++ classes for other kinds of smartcard handling.
  • FakeBO
    FakeBO fakes trojan server responses (Back Orifice, NetBus, etc.) and logs every attempt to a logfile, stdout/stderr or syslog. It is able to send fake pings and replies back to the client which is trying to access your system.
    FBAC-LSM is a security mechanism for Linux which retricts applications based on the features they provide, such as "Web Browser" or "Image Editor".
  • fe3d
    A multiplatform, SDL/OpenGL based 3D visualization tool for network (security) information, it currently supports's nmap and [has very very limited support for] languard XML log files.
  • Firejail
    Firejail is a SUID sandbox program that reduces the risk of security breaches by restricting the running environment of untrusted applications using Linux namespaces.
  • Firewall Builder for Cisco IOS ACL
    Firewall Builder for Cisco IOS ACL completes a set of tools designed to manage a multi-tiered network security system. This module can generate access control list configuration for Cisco routers running IOS 12.x. The Firewall Builder GUI's built-in installer uses ssh to communicate with the router to install the generated ACL configuration. Several installation methods are provided to make sure the management workstation is not "cut off" from the router in the middle of ACL activation. Firewall Builder's built-in policy importer can be used to import existing router configurations.
  • Fortools_dd
    Fortools_dd is a set of forensic apps, created with zenity, for terminal commandos and bash scripts in Linux.
  • Frankenwall
    Frankenwall is a bash shell script intended to create a highly secure IPTables based linux firewall/router with QOS/traffic shaping/bandwidth management.
  • GDecrypt
    GDecrypt was written for making the use of decrypted partitions under Linux more easy. It currently contains a GUI written in PyGTK for decrypting/mounting, unmounting and encryption partitions or container files and it supports partitions created with truecrypt and LUKS
  • glFlow
    glFlow is a robust, fast, portable, pcap-centric (D)DoS detection tool.
  • gnoMint
    gnoMint is a tool for easily creating and managing certification authorities. It provides fancy visualization of all the pieces of information that pertain to a CA, such as x509 certificates, CSRs, and CRLs.
  • gpgutils
    gpgutils is a set of utilities for GNUPG. It includes gpgedit, gpgsignfiles, and gpgverifyfiles. These allow encryption and code signing tasks to be simplified.
  • Graudit
    Graudit is a simple script and signature sets that allows you to find potential security flaws in source code using the GNU utility grep.
  • Hamachi
    Hamachi is a zero-configuration virtual networking system featuring an open security architecture, NAT-to-NAT traversal, and multi-platform client software.
  • Hashrat
    Hashrat is a hash-generation utility that supports the md5, sha1, sha256, sha512, whirlpool, jh-244, jh256, jh-384 and jh-512 hash functions, and also the HMAC versions of those functions.
  • Heimdal
    Heimdal is an implementation of Kerberos 5 that aims to be protocol compatible with existing implementations and RFC 1510. It is also reasonably compatible with the M.I.T Kerberos V5 API, supports Kerberos V5 over GSS-API (RFC 1964), includes a number of important and useful applications (rsh, telnet, popper, etc.), and is backwards compatible with Kerberos V4.
  • Hogwash
    Hogwash is an intrusion detection system(IDS)/packet scrubber. Hogwash can detect attacks on your network, and if you want, filter them out.
  • honeytrap
    Honeytrap is a network security tool written Honeytrap is a network security tool written to observe attacks against TCP services. As a low-interactive honeypot, it collects information regarding known or unknown network-based attacks and thus can provide early-warning information.
  • HUNT
    HUNT is a tool for exploiting well known weaknesses in the TCP/IP protocol suite.
  • hwfwbypass
    hwfwbypass can be used to bypass/fool hardware firewalls. The program has to be started with administrator level privileges on a server.
  • Hyenae
    Hyenae is a highly flexible and platform independent network packet generator. It allows you to reproduce low level Ethernet attack scenarios (such as MITM, DoS, and DDoS) to reveal the potential security vulnerabilities of your network. Besides smart wildcard-based address randomization and a highly customizable packet generation control, Hyenae comes with a clusterable remote daemon for setting up distributed attack networks.
  • Injection Framework
    Injection Framework is a security tool designed to detect and research SQL injections.
  • ip-masq-log
    ip-masq-log is a patch that can be used on a masquerading firewall (NAT) to keep a log of all the outgoing masqueraded TCP connections.
  • ipdecap
    ipdecap can decapsulate traffic encapsulated within GRE, IPIP, 6in4, ESP (ipsec) protocols, and can also remove IEEE 802.1Q (virtual lan) header.
  • ISIC
    IP Stack Integrity Checker tests the stability of an IP Stack and its component stacks (TCP, UDP, ICMP et. al.) It does this by generating random packets of the desired protocol.
  • John the Ripper
    John the Ripper is a password cracker, currently available for UNIX, DOS, WinNT/Win95. Its primary purpose is to detect weak UNIX passwords.
  • Johnny
    Johnny is a graphical user interface for John the Ripper. It was proposed by Shinnok.
  • KIside
    KIside is a message digest computing and displaying tool. It computes and shows the hash code of any file as a string of hexadecimal numbers. KIside implements standard algorithms such as MD4, MD5, SHA1, SHA256, SHA384, SHA512, TIGER, RIPEMD160.
  • lightbar
    lightbar is a login enhancement for FreeBSD and Linux. It adds features from BSD4.4 SunOS(solaris) and HP-UX into a Linux, FreeBSD portable and simple login program.
  • Luksus
    Linux Unified Key Setup easy-to-use-drive-encryptor (Luksus) is a script that makes it quick and easy to create encrypted volumes such as hard drives, USB sticks, and SD cards on on Linux .
    MAPDAV (More Accurate Password Dictionary Attack Vector) is designed to use what is known about users via the /etc/passwd file on Unix/Linux systems to generate a dynamic dictionary of more accurate guesses as to what their possible password may be.
    MASTIFF is a static analysis framework that automates the process of extracting key characteristics from a number of different file formats. To ensure the framework remains flexible and extensible, a community-driven set of plug-ins is used to perform file analysis and data extraction. While originally designed to support malware, intrusion, and forensic analysis, the framework is well-suited to support a broader range of analytic needs.
  • Monkeysphere
    The Monkeysphere enables you to use the OpenPGP web of trust to verify ssh connections. SSH key-based authentication is tried-and-true, but it lacks a true public key infrastructure for key certification, revocation, and expiration. Monkeysphere is a framework that uses the OpenPGP web of trust for these PKI functions. It can be used in both directions: for users to get validated host keys, and for hosts to authenticate users.
  • MozDef
    The Mozilla Defense Platform (MozDef) seeks to automate the security incident handling process and facilitate the real-time activities of incident handlers.
  • Nova
    The Network Obfuscation and Virtualized Anti-Reconnaissance (Nova) system is an open-source software tool developed to detect network based reconnaissance efforts, to deny the attacker access to real network data while providing false information regarding the number and types of systems connected to the network.
  • Nstreams
    Nstreams analyzes the streams that occur on a network. It displays which streams are generated by the users between several networks, and between the networks and the outside. It can optionally generate the ipchains or ipfw rules that will match these streams, thus only allowing what is required for the users, and nothing more.
  • OATH Toolkit
    The OATH Toolkit attempts to collect several tools that are useful when deploying technologies related to Open AuTHentication (OATH), such as the event-based HOTP and time-based TOTP one-time passwords. It is a fork of the earlier HOTP Toolkit.
  • Open Computer Forensics Architecture
    The Open Computer Forensics Architecture (OCFA) is a modular computer forensics framework to automate the digital forensic process, to speed up the investigation and give tactical investigators direct access to the seized data through an easy to use search and browse interface. The architecture forms an environment where existing forensic tools and libraries can be easily plugged into the architecture and can thus be made part of the recursive extraction of data and metadata from digital evidence. It aims to be highly modular, robust, fault tolerant, recursive, and scalable in order to be usable in large investigations that spawn numerous terabytes of evidence data and cover hundreds of evidence items.
  • OpenSCAP
    OpenSCAP is a set of open source libraries providing an easier path for integration of the SCAP line of standards.
  • OS-SIM
    Ossim stands for Open Source Security Information Management. Its goal is to provide a comprehensive compilation of tools which, when working together, grant a network/security administrator with detailed view over each and every aspect of his networks/hosts/physical access devices/server/etc.
  • P-Synch
    (commercial) P-Synch is a password management software toolkit that can: synchronize user passwords across all systems and platforms; enforce enterprise-wide password strength policies; allow help desk staff to reset passwords on every system, with no special administrative rights; allow authenticated users to reset their own forgotten passwords.
  • PacketDam
    (commercial) PacketDam is a software solution against Denial-of-service attacks.
  • PAIP
    PAIP is a universal filter application. It uses plugins to transmit and convert data. They can be nested, so the inner structures can become quite complex.
  • pam_ccreds
    The pam_ccreds module provides the means for Linux workstations to locally authenticate using an enterprise identity when the network is unavailable. Used in conjunction with the nss_updatedb utility, it provides a mechanism for disconnected use of network directories.
  • Panoptis
    Panoptis plans to create a network security tool (N-IDS) to detect and block DoS and DDoS attacks.
  • Parano
    Parano is a GNOME program to create, edit and verify hashfiles. For now MD5 and SFV formats are supported.
    PGSSAPI lets you selectively plug external GSSAPI security libraries into applications without having to recompile the application each time.
  • portreserve
    portreserve aims to help services with well-known ports that lie in the bindresvport() range. It prevents portmap (or other programs using bindresvport()) from occupying a real service's port by occupying it itself, until the real service tells it to release the port (generally in its init script).
  • pppit
    pppit allows one to tunnel through a firewall which only allows proxy telnet, such as SWAN. It is a modified, special-purpose ppp daemon.
  • privbind
    Privbind is a small tool that allows unprivileged programs to be run securely, while still allowing them to bind to privileged ports.
  • ProShield
    ProShield is a security program for Debian Linux. It helps insure your system is secure and up-to-date by checking many different aspects of your system.
  • ptSCP
    ptSCP seeks to create an easy front-end to secure file transfers using scp and ssh. It remotely resembles a popular Windows FTP client.
  • raddump
    raddump interprets captured RADIUS packets to print a timestamp, packet length, RADIUS packet type, source and destination hosts and ports, and included attribute names and values for each packet.
  • rdd
    rdd is a forensic copy program developed at and used by the Netherlands Forensic Institute (NFI). Read more
  • rsbac-init
    The rsbac-init tool is part of the Adamantix RSBAC support tools, which make RSBAC easier to administrate. It is automatically started at system bootup and sets RSBAC kernel options through the RSBAC /proc interface. RSBAC is a Linux kernel patch providing advanced security functionality.
  • RWSecure
    rwsecure parses the /var/log/secure file for invalid usernames or failed passwords to help protect against brute force and similar attacks. If there are more than three invalid or failed attempts by one IP, it will add that IP to your /etc/hosts.deny file.
  • SafeRelay
    SafeRelay is a certificate authority center, based on OpenSSL, for network administrators who want to deploy certificates on a LAN (local area network). SafeRelay is written in CURSEL.
  • SAStk
    Slackware Administrators Security tool kit is a set of tools and utilities to install and maintain a reasonable level of security for the Slackware Linux distribution.
  • Secure Network Forwarding Tunnel
    SNFT is a small program that creates a double encrypted (tunnel in a tunnel, using 2 different SSH supported encryption algorithms) SSH tunnel, as well as automatically forwarding commonly used ports to your local computer through the second tunnel.
  • SEFlow
    SEFlow uses the SELinux technology to provide security centered on individual data objects in a running system instead of focusing on static system facilities. Thus it is suitable to prevent accidental linking of code under open source licenses with proprietary code, making a tainting mechanism similar to the one used in the Linux kernel possible in userspace.
  • sha_digest
    sha_digest is an implementation of the secure hash algorithms SHA-1, SHA-224, SHA-256, SHA 384, and SHA-512 as described in the FIPS 180-3 standard.
  • Shark Cypher
    Shark Cypher (Volume Gamma) is a strong cypher with unique recursive algorithm of bitwise gamma with great avalanche and diffusion.
  • Shishi
    Shishi is a free implementation of the Kerberos 5 network security system. Goals are full standards compliance, thread safe library and internationalization.
  • sigs
    sigs provides secure digital signatures with verification at secret-key speeds. 2048-bit verification on a Pentium-100 takes under 150 microseconds.
  • single-honeypot
    single-honeypot simulates many services like SMTP, HTTP, POP-3, shell, and FTP.
  • skipfish
    skipfish is a high-performance, easy, and sophisticated Web application security testing tool.
  • Slurchin
    Slurchin is a Web interface to a Quickcam for Notebooks Deluxe connected to a NSLU2 running Linux. (It might work for other webcams, hardware, and OSes, but it hasn't been tested.) The application allows the user to take pictures and see them through the Web. It also allows the user to check if the necessary drivers to make the camera work are installed and loaded. It requires w3camd to be installed in the device.
  • SoftHSM
    SoftHSM is an implementation of a cryptographic store accessible through a PKCS#11 interface.
  • sonar
    sonar aims to provide automatic tools which network administrators may use to help check and test the security of their network.
  • squidefender
    squidefender is a Perl script which parses a squid log file in native format for attacks. If it finds an attack is sends a complaint email to the ISP of the attacker.
  • squidwall
    Squidwall is a fast, small, and secure squid redirector. It is written with security in mind. It enables the administrator to build an easy to use Web interface for controlling user-, host-, or IP-based access to squid. It also does pass-through antivirus scanning with clamav.
  • SSHatter
    SSHatter uses a brute force technique to determine the how to log into an SSH server. It simply tries each combination in a list of usernames and passwords to determine which ones successfully log in.
  • sshdfilter
    sshdfilter blocks the frequent brute force attacks on ssh daemons, it does this by directly reading the sshd logging output and generating iptables rules, the process can be quick enough to block an attack before they get a chance to enter any password at all.
  • sshguard
    sshguard protects hosts from the plague of brute force attacks against ssh. Unlike many similar tools written in interpreted languages, it's independent, fast, and lightweight because it's completely written in C. Among the rest, it supports IPv6 and flexible whitelisting.
  • sslexpire
    sslexpire provides remote check for ssl certificate expiration date. It connects to hosts:port, retrieves the expiration date and show you if it's going to expire. It can retrieve multiple host:ports from a config file to do mass daily checks.
  • SSLsplit
    SSLsplit is a tool that performs man-in-the-middle attacks against SSL/TLS encrypted network connections for network forensics and penetration testing.
  • ssss
    ssss is an implementation of Shamir's secret sharing scheme for UNIX systems.
  • sydbox
    sydbox is a ptrace-based sandbox implementation. It intercepts system calls, checks for allowed filesystem prefixes, and denies them when checks fail.
  • System for Internet-Level Knowledge
    SiLK (System for Internet-Level Knowledge) is a collection of traffic analysis tools developed by the CERT Network Situational Awareness Team (CERT NetSA) to facilitate security analysis of large networks. The SiLK tool suite supports the efficient collection, storage and analysis of network flow data, enabling network security analysts to rapidly query large historical traffic data sets. SiLK is ideally suited for analyzing traffic on the backbone or border of a large, distributed enterprise or mid-sized ISP.
  • Systrace
    Systrace enforces system call policies for applications by constraining the application's access to the system. The policy is generated interactively. Operations not covered by the policy raise an alarm, allowing the user to refine the currently configured policy. After a policy has been sufficiently constructed, further alarms often indicate security problems. Policies can also be generated automatically for sandboxing purposes.
  • TFTPgrab
    TFTPgrab is a TFTP (Trivial File Transfer Protocol) stream extractor that reads from tcpdump/libpcap capture files. It attempts to reconstruct data that has been transferred via TFTP, and may be useful in some network forensics situations.
  • The Autopsy Forensic Browser
    The Autopsy Forensic Browser is a graphical interface to the command line digital investigation tools in The Sleuth Kit. The two together enable users to investigate volumes and file systems including NTFS, FAT, UFS1/2, and Ext2/3 in a 'File Manager' style interface and perform key word searches. Read more
  • trapdoor2
    trapdoor2 allows remote users to execute local commands by sending 'magic cookies'. this can e.g. be used to alter local firewalling rules so people can connect to local services after sending the magick cookie.
  • triggers
    triggers is a lightweight, asynchronous notification mechanism to set off events in and across systems.
  • txtorcon
    txtorcon is a Twisted-based asynchronous Tor control protocol implementation. Twisted is an event-driven networking engine written in Python and Tor is an onion-routing network designed to improve people's privacy and anonymity on the Internet.
  • uevalrun
    uevalrun is a self-contained computation sandbox, using User-mode Linux for both compilation and execution of the program to be sandboxed.
  • URLCrazy
    UrlCrazy is for the study of domain name typos and URL hijacking. It can detect typo domain squatters and help protect your domain security by identifying domain names to preemptively register.
  • userv
    userv is a Unix system facility to allow one program to invoke another when only limited trust exists between them.
  • uuturn
    uuturn allows you to detect someone remotely logging in to one of your boxen and then going on to another, without even logging into the box, by only analyzing the packets on the network.
  • webNIS
    webNIS is a simple authentication mechanism. It provides a server, or inetd service which simply takes in a login and a password, and responds with the user's real name (as listed in the gecos records) or nothing in case of failure.
  • Wellenreiter
    Wellenreiter is a GTK/Perl program that makes the discovery, penetration and auditing of 802.11b wireless networks as easy as possible. All three major wireless cards (Prism2, Lucent, and Cisco) are supported. Usability is one of the main goals.
  • WiKID Strong Authentication System
    The WiKID Strong Authentication System is a highly scalable, secure two-factor authentication system consisting of a server, a token client, and network clients that connect a service such as a VPN or Web page to the WiKID server to validate one-time passcodes. The user enters their PIN into the token client, where it is encrypted and sent to the server. If the PIN is correct, the encryption valid, and account active, the one-time passcode is generated, encrypted, and returned to the user. It is simple to implement and maintain, allows users to be validated automatically, requires no hardware tokens, has a simple API for application support via a COM object and Java component, supports multiple domains, and supports replication for fault tolerance and scalability.
  • Worm Warner
    WormWarner is a tool designed to warn hosts that are probably infected by worms. his is done by scanning the Apache log files and sending email to the host or the ISP when an worm or attack is detected. Wormwarner has a simple pattern database which makes it easy to add new worm patterns as they appear.
  • x509watch
    x509watch is a simple command line application that can be used to list soon expiring or already expired X.509 certificates, such as SSL certificates.
  • YARA
    YARA is a tool aimed at (but not limited to) helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families (or whatever you want to describe) based on textual or binary patterns.
  • Yersinia
    Yersinia is a network tool designed to take advantage of some weakness in different network protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. Read more
  • Zodiac
    Zodiac is a DNS protocol analyzation and exploitation program. It is a robust tool to explore the DNS protocol.

Matching Content

Share this Page
Bookmark and Share
Submit this page to popular social networks such as Digg, Twitter, StumbleUpon and more.

My LinuxLinks
  • Bookmarked links
  • Emailed Newsletter
  • Your own profile

  • Top Applications
    100 Essential Apps
    All Group Tests

    Top Free Software
    5 Office Suites
    3 Lean Desktops
    7 Document Processors
    4 Distraction Free Tools
    9 Project Management
    4 Business Solutions
    9 Groupware Apps
    14 File Managers
    10 Databases
    21 Backup Tools
    21 Productivity Tools
    5 Note Taking Apps
    9 Terminal Emulators
    21 Financial Tools
    5 Bitcoin Clients
    21 Text Editors
    21 Video Emulators
    21 Home Emulators
    42 Graphics Apps
    6 CAD Apps
    42 Scientific Apps
    10 Web Browsers
    42 Email Apps
    12 Instant Messaging
    10 IRC Clients
    7 Twitter Clients
    12 News Aggregators
    11 VoIP Apps
    42 Best Games
    9 Steam Games
    42 Audio Apps
    5 Music Streaming
    42 Video Apps
    5 YouTube Tools
    80 Security Apps
    9 System Monitoring
    8 Geometry Apps
    Free Console Apps
    14 Multimedia
    4 Audio Grabbers
    9 Internet Apps
    3 HTTP Clients
    5 File Managers
    8 Compilers
    9 IDEs
    9 Debuggers
    7 Revision Control Apps
    6 Doc Generators
    Free Web Software
    21 Web CMS
    14 Wiki Engines
    8 Blog Apps
    6 eCommerce Apps
    5 Human Resource Apps
    10 ERP
    10 CRM
    6 Data Warehouse Apps
    8 Business Intelligence
    6 Point-of-Sale

    Other Articles
    Migrating from Windows
    Back up your data
    20 Free Linux Books
    24 Beginner Books
    12 Shell Scripting Books

    Web Calendar
    Linux Licenses

    Advertise at


    Add Link | Modify Link | About | FAQ | Guide | Privacy | Awards | Contact |
    Portal Version 0.7. Intel Blade.
    Comments to the webmaster are welcome.
    Copyright 2009 All rights reserved.