Ports Search

Results 4,5914,600 of 5,827 for /net-mgmt/.(0.006 seconds)
security/firewalk-5.0 (Score: 0.0061257896)
Remote firewall auditing tool
Firewalk is a network auditing tool that attempts to determine what transport protocols a given gateway will pass. Firewalk works by sending out TCP or UDP packets with a TTL one greater than the targeted gateway. If the gateway allows the traffic, it will forward the packets to the next hop where they will expire and elicit an ICMP_TIME_EXCEEDED message. If the gateway host does not allow the traffic, it will likely drop the packets on the floor and we will see no response.
security/md5-1.8.5 (Score: 0.0061257896)
Native MD5 implementation in Common Lisp
A native MD5 implementation in Common Lisp.
security/ftimes-3.11.0 (Score: 0.0061257896)
System baselining and evidence collection tool
FTimes is a system baselining and evidence collection tool. Its primary purpose is to gather and/or develop topographical information and attributes about specified directories and files in a manner conducive to intrusion and forensic analysis. It was designed to support the following initiatives: content integrity monitoring, incident response, intrusion analysis, and computer forensics.
security/dmitry-1.3a (Score: 0.0061257896)
Deepmagic Information Gathering Tool
DMitry (Deepmagic Information Gathering Tool) is a UNIX/Linux command line program coded purely in C with the ability to gather as much information as possible about a host.
security/opencryptoki-3.5 (Score: 0.0061257896)
Open PKCS#11 implementation library
openCryptoki is a PKCS#11 implementation.
security/ipfwcount-0.2.1 (Score: 0.0061257896)
Summarise ipfw logs by counting and sorting the fields
ipfwcount reads ipfw(8) logs and extracts the following fields: rule action proto type shost sport dhost dport dir iface You can then print lists like 'top <n> blocked ports', 'top <n> blocked hosts', or 'incoming connections sorted by interface and protocol'. For more sophisticated lists, you can filter the entries using Perl expressions.
security/ipsec-tools-0.8.2 (Score: 0.0061257896)
KAME racoon IKE daemon, ipsec-tools version
racoon speaks IKE (ISAKMP/Oakley) key management protocol, to establish security association with other hosts. This is the IPSec-tools version of racoon. Enchancements: - Support of NAT-T and IKE fragmentation. - Support of many authentication algorithms. - Tons of bugfixes. Known issues: - Non-threaded implementation. Simultaneous key negotiation performance should be improved. - Cannot negotiate keys for per-socket policy. - Cryptic configuration syntax - blame IPsec specification too... - Needs more documentation. Design choice, not a bug: - racoon negotiate IPsec keys only. It does not negotiate policy. Policy must be configured into the kernel separately from racoon. If you want to support roaming clients, you may need to have a mechanism to put policy for the roaming client after phase 1 finishes.
security/gnome-password-generator-1.6 (Score: 0.0061257896)
GNOME 2 password generator
Gnome Password Generator is a GUI based secure password generator. It allows the user to generate a specified number of random passwords of a specified length.
security/cp2fwb-0.6 (Score: 0.0061257896)
Checkpoint FW1 to Firewall Builder ruleset converter
This program can convert your Checkpoint FW1 rulesets into XML files which can then be processed by Firewall Builder.
security/afterglow-1.6.2 (Score: 0.0061257896)
Collection of graph-generating scripts
AfterGlow is a collection of scripts which facilitate the process of generating event graphs and treemaps. AfterGlow 1.x is written in Perl and generates output that can be read by GraphViz or LGL. All the scripts and other files for afterglow are installed in %%DATADIR%%