LANguard Internet Access Control monitors all Internet traffic to prevent unproductive use of the Internet. Its rules engine allows you to specify which sites are allowed, and what type of content your users can search for or read. LANguard has extensive internet usage reporting tools. Because LANguard uses a sniffer engine, it is easy to install and does not affect Internet performance or require you to reconfigure your network clients. It also protects against; External threats (hackers), Internal threats (users accessing shares they are not authorized).
ac07c973f2754c5e221c64aec6dd1a0e88c5a2d65bae674cd01b5e0a0ca638df
In the deployment of the Cayman-DSL router and many others, technitions are failing to reset the default password which in many cases default to no password at all. A malicious user could scan for such devices and on a DSL providers network. Worst case scenerio, the static routing tables can be altered to permit remote sniffing.
d832de63ac31ac9655f2f4b29833981f513ac46b8147d8182cb019544f660fb0
TCPDecode accomplishes about the same thing the tcpdump2ascii, but it does so with much less code and provides an easier to read output.
a6eac96120866390646660bdabb8ef5e5b3f8a31249293e25ef780be0b0411f9
Online copy of the book "Computer Vulnerabilities" covers a complete description of how vulnerabilities can be catagoried, adding great detail to previous works on vulnerability taxonomies. This book is a draft, but because of the dynamic nature of network publications, can be revised at any time.
b017addf7ec81401e5026b13d3fc00546528550c6a103037ac50b5b1932788c8
IRC Crack is a Win98/2000 brute force password cracker for IRC channel keys. Connects directly to an IRC server and uses a wordlist.
b9ee453bc5cf51530499458994d62e93cc4b842b698c0c81a2def82d2437b83e
oftpd is designed to be as secure as an anonymous FTP server can possibly be. It runs as non-root for most of the time, and uses the Unix chroot() command to hide most of the systems directories from external users--they cannot change into them even if the server is totally compromised. It also contains its own directory-change and directory-listing code (most FTP servers execute the system "ls" command to list files).
42151cf3c02b3b9b12ce513387ad50f2b4e084cf1856d66c69338d8275300196
Sharesecret splits a secret into parts, such that at least all of the parts are needed to reconstruct the secret. If you have fewer parts you know only the length of the secret.
348b2798ad28ffdc6723ebe4ce071b9c1688d2a61c8d2123eb7f84349e365e39
GNU Phantom.Security is a computer-controlled security system. Using the software and a simple circuit board (schematics included) that you build, you can create a good basic security system that is computer controlled. The system can use off-the-shelf security devices like motion sensors, door magnets, and fire/smoke detectors with little to moderate modification. And if the machine the system is running on is connected to a LAN/WAN or the Internet, you can have it send e-mail. If you have a pager or cell phone capable of receiving e-mail, then you will have around the clock intrusion/fire detection for your home or office.
9eaa387121633d4df3b14893d5c1e298e89be86a5ea069c88fae80bbf8692429
Extracts .reg files from user and system.dat.
ff7990bd77886a80a829103c402fce23ff547a8d02633cbe18cbb39d10f9f454
This text file which will explain to you how to decrypt win9X paswords stored in the registry. In doc,ascii,and palmpilot formats.
98dcc9f40341685cfecb9b4edcef3ab58328645c74317fb40c86a31b172e6f07