Ports 搜索

共有6,332项符合/net-p2p/的查询结果,以下是第4,1014,110项(搜索用时0.01秒)
security/sshguard-1.7.0 (Score: 0.0046602096)
保护主机的 ssh 和其它服务免于暴力攻击
Sshguard 通过服务的日志活动来监视服务。它通过本地防火墙阻断源地址来对危险活动做出响应。 Sshguard 采用一种巧妙的解析器,可以透明地识别多种日志格式 (syslog、syslog-ng、metalog、multilog、raw messages), 且支持多种服务,包括 SSH、FreeBSD 的 ftpd 和 dovecot。它可以操作所有主流防火墙系统, 包括PF、netfilter/iptables、IPFIREWALL/ipfw、IPFILTER。 Sshguard 包含多种相关特性,如 IPv6 支持、白名单、暂停、日志消息认证。它可靠、 易于安装且仅要求很少的系统资源。
security/ncrypt-0.8.1 (Score: 0.0046602096)
Advanced AES file encryption tool
NCrypt is intended to give you security in an insecure environment. If you are wanting to encrypt files (particularly on a multi-user system where you don't have root), wishing to hide your activites from prying eyes, and want to "cover your tracks", then NCrypt is for you. It is a symmetrical file encryptor/decryptor that gives you the choice of the top three candidates for AES as the encryption algorithm (Rijndael, Serpent, Twofish), tries to minimize exposure of the plaintext password in memory, and can safely erase the plaintext version from the hard drive. It compiles without any extra crypto libraries, making it ideal for systems where you just have a compiler and basic libraries (such as an ISP's shell server).
security/oinkmaster-2.0 (Score: 0.0046602096)
Help you update your snort rules after each update
Oinkmaster is simple Perl script released under the BSD license to help you update your Snort 1.9+ rules and comment out the unwanted ones after each update. It will tell you exactly what had changed since the last update, hence giving you good control of your rules.
security/oidentd-2.0.8 (Score: 0.0046602096)
Ident server that supports user-defined ident strings
From the README: "oidentd is an ident (rfc1413 compliant) daemon that runs on Linux, FreeBSD, OpenBSD and Solaris. oidentd can handle IP masqueraded/NAT connections on Linux, FreeBSD (ipf only) and OpenBSD. oidentd has a flexible mechanism for specifying ident responses. Users can be granted permission to specify their own ident responses. Responses can be specified according to host and port pairs." FreeBSD's inetd has a built-in ident service which can also generate bogus responses. Please see the TODO file for more information on why only ipf is supported under FreeBSD. Mark Laws mdl@60hz.org
security/ossec-hids-2.8.3 (Score: 0.0046602096)
Security tool to monitor and check logs and intrusions
OSSEC is an Open Source Host-based Intrusion Detection System. It performs log analysis, integrity checking, Windows registry monitoring, rootkit detection, time-based alerting and active response.
security/axTLS-1.4.9 (Score: 0.0046602096)
SSL/TLS client/server library implementation
The axTLS project is an SSL client/server library using the TLSv1 protocol. It is designed to be small and fast, and is suited to embedded projects. A web server is included.
security/base-1.4.5 (Score: 0.0046602096)
Basic Analysis and Security Engine - analyzing Snort alerts
BASE is the Basic Analysis and Security Engine. It is based on the code from the ACID project. This application provides a PHP-based web front-end to query and analyze the alerts coming from a Snort IDS system. BASE is a web interface to perform analysis of intrusions that Snort has detected on your network. It uses a user authentication and role-base system, so that you as the security admin can decide what and how much information each user can see. It also has a simple to use, web-based setup program for people not comfortable with editing files directly.
security/ccrypt-1.10 (Score: 0.0046602096)
Command-line utility for encrypting and decrypting files and streams
ccrypt is a utility for encrypting and decrypting files and streams. It was designed to replace the standard Unix crypt utility, which is notorious for using a very weak encryption algorithm. ccrypt is based on the Rijndael cipher, which is the U.S. government's chosen candidate for the Advanced Encryption Standard (AES, see http://www.nist.gov/aes/). This cipher is believed to provide very strong security. Unlike Unix crypt, the algorithm provided by ccrypt is not symmetric, i.e., one must specify whether to encrypt or decrypt. The most common way to invoke ccrypt is via the commands ccencrypt and ccdecrypt. There is also a ccat command for decrypting a file directly to the terminal, thus reducing the likelihood of leaving temporary plaintext files around. In addition, there is a compatibility mode for decrypting legacy Unix crypt files. Encryption and decryption depends on a keyword (or key phrase) supplied by the user. By default, the user is prompted to enter a keyword from the terminal. Keywords can consist of any number of characters, and all characters are significant (although ccrypt internally hashes the key to 256 bits). Longer keywords provide better security than short ones, since they are less likely to be discovered by exhaustive search.
security/ccsrch-1.0.3 (Score: 0.0046602096)
Is a tool that searches for credit card numbers (PAN) and track data
ccsrch is a tool that searches for and identifies unencrypted and contiguous credit card numbers (PAN) and track data on Windows and UNIX operating systems. It will also identify the location of the PAN data in the files and record MAC times.
security/ckpass-0.2 (Score: 0.0046602096)
Ncurses based password database client
An ncurses based password database client that is compatible with KeePass 1.x format databases.