jasminecorp.net directory
Updated Blogs
More .....



 
 

| Add Search | Advertise With JCSearch | Suggest a Site

Search the Web


Search Results

Security
Directory > Computers > Software > Operating Systems > Linux > Security

Categories
 
Advisories and Patches (4) Distributions (14) Kernel (9)
Articles (10) Documentation (25)

Web Sitesi

SSH, the Secure Shell: The Definitive Guide
This is a companion website for "SSH: The Secure Shell The Definitive Guide" by Daniel
Barrett and Richard Silverman (O'Reilly, 2003). It contains technical details on the SSH as well
as sample book material.

http://www.snailbook.com
Reviews Rating: Not yet Rated Whois Check

The Digital Underground
Computer and Technology articles, and a members page for the "digital underground"
community with text, programs, and security information.

http://www.shoktek.com/du
Reviews Rating: Not yet Rated Whois Check

Password Management System
Designed for System Administrators, to handle user logins for several computers running Linux. It
works with a console interface, based on the CDK library that uses ncurses. Import data from csv
files and export to text files with a free definable format.

http://passwordms.sourceforge.net/
Reviews Rating: Not yet Rated Whois Check

The Linux Kernel Auditing Project
The project that aims to audit the Linux kernel for security vulnerabilities and other bugs.
http://sourceforge.net/projects/kernel-audit/
Reviews Rating: Not yet Rated Whois Check

Googgun Technologies Praetor module
Praetor is a kernel-based "Security Enabler" for Linux that provides fine-grained access
control.

http://www.googgun.com/
Reviews Rating: Not yet Rated Whois Check

Rubberhose
A filesystem that can be used to hide files on the disk by dissolving them in the innocent disk
content.

http://www.rubberhose.org/
Reviews Rating: Not yet Rated Whois Check

StegFS - A Steganographic File System for Linux
Not only does it encrypt data, it also hides it such that it cannot be proved to be there.
http://www.mcdonald.org.uk/StegFS/
Reviews Rating: Not yet Rated Whois Check

NiftyBox Advisor
Open-source security tools including "Advisor" to automatically notify an admin when a
security advisory affects an installed package.

http://www.niftybox.com/
Reviews Rating: Not yet Rated Whois Check

Sardonix.org
DARPA-funded community project to audit the source of all Linux applications for security
vulnerabilities.

https://www.sardonix.org/
Reviews Rating: Not yet Rated Whois Check

Packetstorm
Security updates and news bulletins, mostly Linux but also NT. A lot of software tips and links.
http://packetstorm.decepticons.org/
Reviews Rating: Not yet Rated Whois Check

Linuxbroker - Security
Linuxbroker provides all types of resources you need like Linux newsgroups search engine, daily
news, howtos, applications releases tracking and security alerts.

http://security.linuxbroker.com
Reviews Rating: Not yet Rated Whois Check

New Security Features in Linux 2.4
Selective privileges (capabilities), cryptography, random number devices.
http://www.linuxsecurity.com/feature_stories/kernel-24-security.html
Reviews Rating: Not yet Rated Whois Check

Penetrator Megablaster
A kernel module that detects and stops overflow attacks, like Linux Buffer Overflow attack
security, which aim to get an interactive access to the system.

http://www.angelfire.com/linux/borisl/MegaBlaster.html
Reviews Rating: Not yet Rated Whois Check

Linux Audit and Intrusion Detection
InterSect Alliance are the creators of the SNARE Linux C2-style Audit module, and have a consulting
background in advanced audit analysis, intrusion detection systems, and forensics for Unix and
other operating systems.

http://www.intersectalliance.com/projects/Snare/index.html
Reviews Rating: Not yet Rated Whois Check

Hacking Linux Exposed
Companion Website to Hacking Linux Exposed, Osborne/McGraw-Hill. Source code from the book,
updates, and other tools to secure your Linux system.

http://www.hackinglinuxexposed.com/
Reviews Rating: Not yet Rated Whois Check

Dranch: TrinityOS
Step by step, example driven, HOWTO on building a Linux box with an aim towards strong security.
Also, links to resources and mailing lists.

http://www.ecst.csuchico.edu/~dranch/LINUX/index-linux.html
Reviews Rating: Not yet Rated Whois Check

Exploit World - Linux Section
Known vulnerabilities on the Linux system with detailed description.
http://www.insecure.org/sploits_linux.html
Reviews Rating: Not yet Rated Whois Check

Linux Security
Linux Security, server hardening, 1U server, 24x7 server admin, monitoring, IDS, NDS, firewalls
http://www.Linux-Sec.net
Reviews Rating: Not yet Rated Whois Check

Linux Security
Information collected from many sources: feature articles, advisories, news, documentation, forums,
links.

http://www.linuxsecurity.com/
Reviews Rating: Not yet Rated Whois Check

Bastille Linux
Attempts to "harden" (tighten the configuration of) a Red Hat or Mandrake Linux
installation.

http://www.bastille-linux.org/
Reviews Rating: Not yet Rated Whois Check

 


Jasminecorp.net directory is based on the Open Directory and is being modified by Jasminecorp.

©2004 Jasmine Computers Inc.

Click here to subscribe for Jasminecorp's product News.

Home | JCBid |Software Development | Domain Registration | Hosting | Web Designing | Buy Books | Advertise with JCSearch | Whois | IP Locator | Add Search | Shopping | Store | Free Blogs | Free GuestBook | Free E-Cards | Free Games | Free Tutorials | Set as Home | Add to Favorite | Suggest a Site | Directory | Our Portfolio | Terms of service | Free quote | Tell a Friend | Special Offer | Job Opportunities | games | Usenet Groups

Submit a Site to Jasminecorp.net Directory || Advertise with us

 

Help build the largest human-edited directory on the web.
Submit a Site - Open Directory Project - Become an Editor
Get a Domain Name:
.com .us .info
.org .in .name
.net .biz .asia