Ports 搜索

共有5,161项符合/ports-mgmt/的查询结果,以下是第3,8313,840项(搜索用时0.004秒)
security/arpCounterattack-1.2.0 (Score: 0.006224396)
Detects and remedies ARP attacks
arpCounterattack is a program for detecting and remedying "ARP attacks." It monitors traffic on any number of Ethernet interfaces and examines ARP replies and gratuitous ARP requests. If it notices an ARP reply or gratuitous ARP request that is in conflict with its notion of "correct" Ethernet/IP address pairs, it logs the attack if logging is enabled, and, if the Ethernet interface that the attack was seen on is configured as being in aggressive mode, it sends out a gratuitous ARP request and a gratuitous ARP reply with the "correct" Ethernet/IP address pair in an attempt to reset the ARP tables of hosts on the local network segment. The corrective gratuitous ARP request and corrective gratuitous ARP reply can be sent from an Ethernet interface other than the one that the attack was seen on.
security/authforce-0.9.9 (Score: 0.006224396)
HTTP authentication brute forcer
Authforce is an HTTP authentication brute forcer. Using various methods, it attempts brute force username and password pairs for a site. It has the ability to try common username and passwords, username derivations, and common username/password pairs. It is used to both test the security of your site and to prove the insecurity of HTTP authentication based on the fact that users just don't pick good passwords.
security/autossh-1.4e (Score: 0.006224396)
自动重新启动 SSH 会话和隧道
autossh 程序,启动一个 ssh 副本并监视它,必要的时候重启它,比如它死了 或者停止通信了。 最初的想法和机制来自 rstunnel(可靠的 SSH 隧道)。这个版本的方法有所 改变:autossh 使用 ssh 来构建 ssh 转发环路(一个从本地到远程,一个从 远程到本地),然后发送测试数据并期待其返回。(这个想法得感谢泰伦斯·马丁。)
security/base-1.4.5 (Score: 0.006224396)
Basic Analysis and Security Engine - analyzing Snort alerts
BASE is the Basic Analysis and Security Engine. It is based on the code from the ACID project. This application provides a PHP-based web front-end to query and analyze the alerts coming from a Snort IDS system. BASE is a web interface to perform analysis of intrusions that Snort has detected on your network. It uses a user authentication and role-base system, so that you as the security admin can decide what and how much information each user can see. It also has a simple to use, web-based setup program for people not comfortable with editing files directly.
security/bdc-7.0.1 (Score: 0.006224396)
BitDefender Console Antivirus for FreeBSD
BitDefender Console Antivirus
security/checkpassword-pam-0.99 (Score: 0.006224396)
Implementation of checkpassword authentication program
checkpassword-pam was written from scratch. There are several older packages called checkpassword-pam, derived from DJB's checkpassword code. This checkpassword-pam is more modern and administrator-friendly.
security/chrootuid-1.3 (Score: 0.006224396)
Simple wrapper that combines chroot(8) and su(1) into one program
The chrootuid command combines chroot(8) and su(1) into one program, so that there is no need to have commands such as /usr/bin/su in the restricted environment. Access to the file system is restricted to the newroot subtree and privileges are restricted to those of the newuser account (which must be a known account in the unrestricted environment). See also jail(8)
security/aescrypt-0.7 (Score: 0.006224396)
Command-line AES encryption/decryption suite
From the aescrypt README.html: This is a program for encrypting/decrypting streams of data using Rijndael and Cipher Block Feedback mode (CFB-128). ... 5. This program was deliberately kept extremely simple. It is not intended to be a full encryption solution, it is intended to be used within scripts as part of a complete solution. Keychain management, public key signatures, etc. are all expected to be done external to this program.
security/ike-scan-1.9 (Score: 0.006224396)
VPN scanner and identifier
ike-scan discovers IKE hosts and can also fingerprint them using the retransmission backoff pattern. ike-scan does two things: a) Discovery: Determine which hosts are running IKE. This is done by displaying those hosts which respond to the IKE requests sent by ike-scan. b) Fingerprinting: Determine which IKE implementation the hosts are using. This is done by recording the times of the IKE response packets from the target hosts and comparing the observed retransmission backoff pattern against known patterns.
security/blindelephant-1.0 (Score: 0.006224396)
Fingerprint the web applications used by a web site
The BlindElephant Web Application Fingerprinter attempts to discover the version of a (known) web application by comparing static files at known locations against precomputed hashes for versions of those files in all available releases. The technique is fast, low-bandwidth, non-invasive, generic, and highly automatable.