-
FusionChartsFree-demo-2.2-1.lbn13.noarch
Demonstrations and examples for FusionChartsFree
Located in
LBN
/
…
/
Plone and Zope
/
BastionLinux 13
-
FusionChartsFree-demo-2.2-1.lbn19.noarch
Demonstrations and examples for FusionChartsFree
Located in
LBN
/
…
/
Plone and Zope
/
BastionLinux 19
-
fwknop-1.9.12-1.x86_64
fwknop implements an authorization scheme known as Single Packet
Authorization (SPA) that requires only a single encrypted packet to
communicate various pieces of information including desired access through an
iptables policy and/or specific commands to execute on the target system.
The main application of this program is to protect services such as SSH with
an additional layer of security in order to make the exploitation of
vulnerabilities (both 0-day and unpatched code) much more difficult. The
authorization server passively monitors authorization packets via libpcap and
hence there is no "server" to which to connect in the traditional sense. Any
service protected by fwknop is inaccessible (by using iptables to
intercept packets within the kernel) before authenticating; anyone scanning for
the service will not be able to detect that it is even listening. This
authorization scheme offers many advantages over port knocking, include being
non-replayable, much more data can be communicated, and the scheme cannot be
broken by simply connecting to extraneous ports on the server in an effort to
break knock sequences. The authorization packets can easily be spoofed as
well, and this makes it possible to make it appear as though, say,
www.yahoo.com is trying to authenticate to a target system but in reality the
actual connection will come from a seemingly unrelated IP. Although the
default data collection method is to use libpcap to sniff packets off the
wire, fwknop can also read packets out of a file that is written by the
iptables ulogd pcap writer or by a separate sniffer process.
Located in
LBN
/
…
/
Core Linux
/
BastionLinux 13
-
fwknop-2.0-3.fc18.1302260917kf.armv6hl
fwknop implements an authorization scheme known as Single Packet
Authorization (SPA) that requires only a single encrypted packet to
communicate various pieces of information including desired access through an
iptables policy and/or specific commands to execute on the target system.
The main application of this program is to protect services such as SSH with
an additional layer of security in order to make the exploitation of
vulnerabilities (both 0-day and unpatched code) much more difficult. The
authorization server passively monitors authorization packets via libpcap and
hence there is no "server" to which to connect in the traditional sense. Any
service protected by fwknop is inaccessible (by using iptables to
intercept packets within the kernel) before authenticating; anyone scanning for
the service will not be able to detect that it is even listening. This
authorization scheme offers many advantages over port knocking, include being
non-replayable, much more data can be communicated, and the scheme cannot be
broken by simply connecting to extraneous ports on the server in an effort to
break knock sequences. The authorization packets can easily be spoofed as
well, and this makes it possible to make it appear as though, say,
www.yahoo.com is trying to authenticate to a target system but in reality the
actual connection will come from a seemingly unrelated IP. Although the
default data collection method is to use libpcap to sniff packets off the
wire, fwknop can also read packets out of a file that is written by the
iptables ulogd pcap writer or by a separate sniffer process.
Located in
LBN
/
…
/
Core Linux
/
BastionLinux 13
-
fwupd-2.0.0-3.lbn36.x86_64
fwupd is a daemon to allow session software to update device firmware.
Located in
LBN
/
…
/
Core Linux
/
BastionLinux 36
-
fwupd-efi-1.6-1.lbn36.x86_64
fwupd is a project to allow updating device firmware, and this package provides
the EFI binary that is used for updating using UpdateCapsule.
Located in
LBN
/
…
/
Core Linux
/
BastionLinux 36
-
fwupd-plugin-flashrom-2.0.0-3.lbn36.x86_64
This provides the optional package which is only required on hardware that
can be flashed using flashrom. It is probably not required on servers.
Located in
LBN
/
…
/
Core Linux
/
BastionLinux 36
-
fwupd-plugin-modem-manager-2.0.0-3.lbn36.x86_64
This provides the optional package which is only required on hardware that
might have mobile broadband hardware. It is probably not required on servers.
Located in
LBN
/
…
/
Core Linux
/
BastionLinux 36
-
fwupd-plugin-uefi-capsule-data-2.0.0-3.lbn36.x86_64
This provides the pregenerated BMP artwork for the UX capsule, which allows the
"Installing firmware update…" localized text to be shown during a UEFI firmware
update operation. This subpackage is probably not required on embedded hardware
or server machines.
Located in
LBN
/
…
/
Core Linux
/
BastionLinux 36
-
fwupdate-0.4-1.lbn19.x86_64
fwupdate provides a simple command line interface to the UEFI firmware updates.
Located in
LBN
/
…
/
Core Linux
/
BastionLinux 19