50 Essential Open Source Security Tools - page 4
Anti-Everything, Encryption, Secure Delete, Forensics
This lightweight password safe remembers all your passwords, so don't have to. For security, it encrypts your passwords using AES and Twofish, two of the most powerful encryption algorithms available. Operating System: Windows.
You shouldn't need a password cracker on a regular basis, but when an employee leaves without informing you of his or her password, it's handy to have one in your toolkit. This one works pretty well and can run directly from a CD. Operating System: Windows, Mac, Linux, Unix.
WiKID provides Java-based two-factor authentication. Note that you'll need a PDA or USB device you can use as a token in order to make it work. Operating System: OS Independent.
39. Password Safe
An alternative to KeePass, Password Safe gives you the option of creating multiple encrypted password databases (for home and work, for example). It can also generate strong passwords for you. Operating System: Windows.
Developed by the OpenBSD project, OpenSSH offers a set of SSH, SCP, and SFTP tools for secure remote access and file transfer. It encrypts all traffic, including passwords, to make hijacking nearly impossible. Operating System: Linux, Unix, BSD.
This basic telnet/SSH client offers remote access for most Windows and Unix systems. Note that it does not support Vista. Operating System: Windows, Unix.
Despite its lightweight configuration, OpenVPN offers a robust, full-featured SSL VPN that works equally well for both small businesses and enterprises. Key features include load balancing, failover, and flexible access control, including support for two-factor authentication. Operating System: Windows, Mac, Linux, BSD, Solaris.
With the SingleClick addon, UltraVNC is ideal for helpdesk situations. Key features include secure file transfer and chat capabilities. Operating System: Windows.
Short for "Another File Integrity Checker," Afick is very similar to Tripwire, which is now a commercial product. It alerts you to changes on your system that may have been caused by intrusions. Operating System: OS Independent.
The "world leader in active scanners," Nessus quickly scans your entire network locating vulnerable data and resources and detecting when security policies have been breached. The latest versions of Nessus are free to download, but are no longer open source. However, you can still download the older open source version and the source code from the site. Operating System: Windows, Mac, Linux, BSD, Solaris.
One of the best ways to test the security of your network is to use the same tools hackers are likely to be using. As the standard attack and penetration toolkit, Metasploit gives you the opportunity to find vulnerabilities before the black hats do. Operating System: Windows, Unix.
Nikto scans Web servers for thousands of dangerous files and server-specific problems. Optional automatic updates are available. Operating System: Windows, Mac, Linux, Unix, BSD.
This Java-based scanner intercepts all http and https data transmitted between server and client to help evaluate the security of Web applications. It includes a spider, proxy-chaining, intelligent scanning for XSS and SQL injections, and more. Operating System: OS Independent.
Designed primarily for Debian and Ubuntu, ProShield scans your system to make sure your software is up-to-date and that you haven't picked up any malware. It also reminds you to backup your system, checks your available disk space, and performs other routine maintenance checks. Operating System: Linux.
Short for "Internet Secure Access Kit," iSAK blocks access to objectionable Web sites based on user-defined rules and provides a variety of reports so that you can see what sites your users have been visiting. You can block entire categories of sites (e.g., adult content, gaming, etc.) or block access by domain, URL, or a number of other criteria. Operating System: Linux, Unix, BSD.
Article courtesy of Datamation
- Skip Ahead
- 1. Anti-Everything, Encryption, Secure Delete, Forensics
- 2. Anti-Everything, Encryption, Secure Delete, Forensics
- 3. Anti-Everything, Encryption, Secure Delete, Forensics
- 4. Anti-Everything, Encryption, Secure Delete, Forensics