(Page 1 of 6) 1 2 3 4 5 6 Next > Category: Access Control » user privileges Access Manager1 Added 2006-02-23 Access Manager is an award wining software for monitoring the networked computers. This software can be helpful for government organization, companies, schools, colleges etc to monitor the activities on the computers. Its cleverly designed GUI offers you the access to various functions easily. It is very easy to use for both a novice user and an expert user. it allows real time monitoring of employees and continuous tracking of users activities on networked computers. Designed for monitoring employees, workers, students, tracking the usage of public computers in libraries or spying on individual network attached PC. Access Manager is used to track employees activities in organizations that have from two to hundreds networked computers. All monitoring options are configured remotely from a single PC. This employee monitoring software can record activity on all computers in LAN for future advanced analysis with excellent report generation capabilities. Using our PC monitoring software you will increase the productivity of working staff in your company. Windows Permission Identifier Added 2006-01-18 This tool enables administrators and penetration testers to review and audit the permissions of users on a windows machine. Windows Permission Identifier can check; File ACLs Folder ACLs Registry ACLs Services Permissions Shares Installation rights Internet Access and so on. The GUI enables the administrator to create policies that can be saved in XML format. The windows machines permissions are then checked against this policy. This enables administrators to run checks against existing organisational windows security baseline documents. Policies can be saved in XML format and all results can be exported for further use. WARNING: The policy that is included is a sample of the functionality of the tool. It is not a security policy that should be followed. Report Bugs & send your own policy files : nhouse[at]stationx.net It would be very useful to the community if you send me any policies you create. For example, Web server, desktop, domain controller or what ever you create. I will upload your policy files to the site and credit you. NuFW Added 2005-04-11 NuFW performs an authentication of every single connections passing through the IP filter, by transparently requesting user's credentials before any filtering decision is taken. Practically, this brings the notion of user ID down to the IP layers. SafeLogon Added 2005-02-09 SafeLogon is a multi-user and password-based access control utility that enhances and complements the Windows built-in logon and authentication system. In other words, SafeLogon allows you to protect your system at home and office from unauthorized access. SafeLogon is fully configurable and allows its Administrator to: - Restrict access to Windows to certain users, optionally controlling the days of the week and the time of the day the user is allowed to log on and SafeSystem Added 2005-02-09 SafeSystem is a security program that allows you to prevent access to your personal and important files and folders, as well as protect and guarantee the integrity and well functioning of your system. SafeSystem can make your files and folders completely invisible, inaccessible or simply read-only. Furthermore, SafeSystem can prevent the change of configuration and the accidental (or even intentional) system files deletion or alteration, so your PC will be healthy rootsh Added 2004-11-12 Rootsh is a wrapper for shells which logs all echoed keystrokes and terminal output to a file and/or to syslog. It's main purpose is the auditing of users who need a shell with root privileges. They start rootsh through the sudo mechanism. I's in heavy use here at a big bavarian car manufacturer (three letters, fast, cool,...) for project users whom you can't deny root privileges. vthrottle Added 2004-06-02 vthrottle is an implementation of an SMTP throttling engine for Sendmail servers, based upon M. Williamson's mechanisms, as described in his 2003 Usenix Security paper. It allows the administrator to control how much email users and hosts may send, hindering the rapid spread of viruses, worms, and spam. Jail Chroot Project Added 2004-02-09 Jail is a chrooted environment engine, designed to easily build a full chrooted environment. CVS-SSH2 Plug-in for Eclipse Added 2004-02-05 CVS-SSH2 Plug-in for Eclipse is an Eclipse plug-in to allow CVS access on an encrypted session by SSH2 protocol. op Added 2004-01-26 op allows fine-grained control of access to super-user privileges through easy to remember mnemonics. Its features include user and host based access control, and command expiration. Browse by category |
|
Privacy Statement |