Ports Search

Results 6,7316,740 of 19,819 for %22HTTP Server%22.(0.009 seconds)
security/suricata-3.1.1 (Score: 0.0012383816)
High Performance Network IDS, IPS and Security Monitoring engine
The Suricata Engine is an Open Source Next Generation Intrusion Detection and Prevention Engine developed by the Open Information Security Foundation (OISF). This engine is not intended to just replace or emulate the existing tools in the industry, but will bring new ideas and technologies to the field. OISF is part of and funded by the Department of Homeland Security's Directorate for Science and Technology HOST program (Homeland Open Security Technology), by the Navy's Space and Naval Warfare Systems Command (SPAWAR), as well as through the very generous support of the members of the OISF Consortium. More information about the Consortium is available, as well as a list of our current Consortium Members.
security/zxid-1.42 (Score: 0.0012383816)
Open Source IdM for the Masses - SAML SSO
ZXID aims at full stack implementation of all federated identity management and identity web services protocols. Initial goal is supporting SP role, followed by ID-WSF WSC and IdP roles. ZXID is light weight, has a small foot print, and is implemented in C. It is suitable for both high performance and embedded applications. Scripting languages are supported using SWIG, including Perl, PHP and Java. The "full stack" nature of ZXID means it's self contained and has minimal external library dependencies (see downloads).
security/tcpcrypt-0.3.r1 (Score: 0.0012383816)
TCPCrypt userland divert daemon
Tcpcrypt is a protocol that attempts to encrypt (almost) all of your network traffic. Unlike other security mechanisms, Tcpcrypt works out of the box: it requires no configuration, no changes to applications, and your network connections will continue to work even if the remote end does not support Tcpcrypt, in which case connections will gracefully fall back to standard clear-text TCP. Install Tcpcrypt and you'll feel no difference in your every day user experience, but yet your traffic will be more secure and you'll have made life much harder for hackers.
security/tor-0.2.9.2.a (Score: 0.0012383816)
Anonymizing overlay network for TCP
Tor: an anonymizing overlay network for TCP Tor is a connection-based low-latency anonymous communication system which addresses many flaws in the original onion routing design. Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet. Using Tor can help you anonymize web browsing and publishing, instant messaging, IRC, SSH, and more. Tor also provides a platform on which software developers can build new applications with built-in anonymity, safety, and privacy features. Remember that this is development code -- DON'T RELY ON THE CURRENT TOR NETWORK FOR ANONYMITY!
security/xinetd-2.3.15 (Score: 0.0012383816)
Replacement for inetd with better control and logging
Xinetd is a replacement for inetd, the internet services daemon. Xinetd is not just an inetd replacement. Anybody can use it to start servers that don't require privileged ports because xinetd does not require that the services in its configuration file be listed in /etc/services. Its configuration file has a different format than inetd's one and it understands different signals. However the signal-to-action assignment can be changed.
security/nmap-7.25.b2 (Score: 0.0012383816)
GUI frontend for the Nmap scanning utility
Zenmap is the official GUI front end for the Nmap port scanning tool. Originally based on Umit, it has replaced NmapFE as per Nmap 4.50. Also included are python based Nmap auxiliary tools (currently Ndiff).
shells/fish-2.3.1 (Score: 0.0012383816)
User friendly command line shell
fish is a user friendly commandline shell intended mostly for interactive use.
shells/ibsh-0.3e (Score: 0.0012383816)
Restricted unix shell
Iron Bars Shell is a restricted Unix shell. The user can not step out of, nor access files outside the home directory. It is written in C for Linux. No libraries used. It is small, fast, secure. Two ascii configuration files for more control.
shells/ksh93-20120801 (Score: 0.0012383816)
Official AT&T release of KornShell 93
KSH-93 is the most recent version of the KornShell Language described in "The KornShell Command and Programming Language," by Morris Bolsky and David Korn of AT&T Bell Laboratories. The KornShell is a shell programming language, which is upward compatible with "sh" (the Bourne Shell), and is intended to conform to the IEEE P1003.2/ISO 9945.2 Shell and Utilities standard. KSH-93 provides an enhanced programming environment in addition to the major command-entry features of the BSD shell "csh". With KSH-93, medium-sized programming tasks can be performed at shell-level without a significant loss in performance. In addition, "sh" scripts can be run on KSH-93 without modification.
shells/lshell-0.9.16 (Score: 0.0012383816)
Shell environment to limited sets of commands to users
lshell lets you restrict a user's shell environment to limited sets of commands, choose to enable or disable any command over SSH (e.g. SCP, SFTP, rsync, etc.) log user's commands, implement timing restrictions, and more.