Home > Computers > Software > Operating Systems > Unix > Security > Protection
http://www.citi.umich.edu/u/provos/cybersecurity/
Practical measures for critical infrastructure protection, intrusion prevention and threat assessment.
http://all.net/contents/dtk.html
Make your system seem to have network security bugs, and log attack attempts.
http://cvs.linux.hr/fakebo/
Fakes trojan servers (Back Orifice, NetBus) and logs every attempt from client.
http://www.dwheeler.com/flawfinder/
Examines source code looking for security weaknesses.
http://www.xmailserver.org/gmm.html
The GMM library can be used to prevent and study buffer overflows exploits
http://la-samhna.de/samhain/
A tool for file integrity checking that optionally can be used as a client/server application for centralized monitoring of networked hosts.
ftp://ftp.porcupine.org/pub/security/index.html
Security tools and papers. A website by Wietse Venema.
Home > Computers > Software > Operating Systems > Unix > Security > Protection
Thanks to DMOZ, which built a great web directory for nearly two decades and freely shared it with the web. About us