(Page 1 of 8) 1 2 3 4 5 6 Next > Category: Auditing » File Integrity darc - Distributed Aide Runtime Controller Added 2006-04-24 darc is a multi-threaded Python application designed for managing AIDE installations in large heterogeneous networks. It provides centralized database management, unified reporting, and eliminates the need to maintain Aide databases and binaries on read-only media. SysChk Added 2006-01-21 SysChk is a tool to aide in the monitor of file system integrity. This tool will ensure the integrity of files & directories is monitored for any changes. Monitored changes include: User Ownership. Group Ownership. File Permissions. Modified Time. Md5 Hash. EagleEyeOS Professional Added 2006-01-13 This file and data security software provides solutions for the problems that occupy every IT security specialists on the world caused by development of the data transmission and increasing size of the built-in memories in data storage devices. The software blocks data larcenies with determining the access rights, prohibiting the unauthorized access and identifies the entitled person, who abuses the sensitive and/or classified information. EagleEyeOS One Added 2006-01-13 The assorted function capacity comprises above all the monitoring and blocking of external devices and storages, additionally protects against data leakage. It is a quick and efficient, and simple solution to protect electronic data and documents and it is easy-to-install for single-computer systems and smaller networks. SafeSystem Added 2005-02-09 SafeSystem is a security program that allows you to prevent access to your personal and important files and folders, as well as protect and guarantee the integrity and well functioning of your system. SafeSystem can make your files and folders completely invisible, inaccessible or simply read-only. Furthermore, SafeSystem can prevent the change of configuration and the accidental (or even intentional) system files deletion or alteration, so your PC will be healthy DmpE32 -Symbian Executable Information Dumper Added 2004-09-09 Symbian Exe File dumper * Useful for analysis of potential malware. * Determine wheteher or not an executable has been inappropiately modified(Mosquitos "Trojan"). * Provides information on: - Header (UIDs,Section sizes, Entry Point, Application Type) - Imported functions list (DLL name and number of functions by default) Xintegrity Added 2004-07-19 Xintegrity makes it virtually impossible for anybody or anything to modify your files without being detected. When Xintegrity detects a modified file it will show exactly how and when the file was modified and display the contents of the modified file in comparison with an optionally backed up copy of the file. All your files [including operating system files] can be protected. Xintegrity can automatically create protected backup files [optionally encrypted with 256 bit] afick Added 2004-05-12 afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. You can then run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Samhain Added 2004-04-15 samhain is a daemon that can check file integrity, search the file tree for SUID files, and detect kernel module rootkits (Linux only). It can be used either standalone or as a client/server system for centralized monitoring, with strong (192-bit AES) encryption for client/server connections and the option to store databases and configuration files on the server. For tamper resistance, it supports signed database/configuration files and signed reports/audit logs. It has been tested on Linux, FreeBSD, Solaris, AIX, HP-UX, and Unixware. Mailfilter Added 2004-02-16 Mailfilter is a flexible utility to get rid of unwanted spam mails, before having to go through the trouble of downloading them into the local computer. It offers support for one or many POP3 accounts and is especially useful for dialup connections via modem. You can define your own filters (rules) to determine which e-mails should be delivered and which are considered waste. Browse by category |
|
Privacy Statement |