Category Index:
/pub/tools/dos
No Pointing!
This WWW page was generated automatically. Link makers should
not point their links to this page. If you must, please
make a link to the
search entry point.
Adafinn Software Inc.,
GateWAY
1.2
Keywords: password locking, access control
Abstract: GateWAY provides a way of restricting access by
using a PASSWORD. Up to 30 users, each with different passwords.
Options include - colour, welcome message, passwords, password
character, incorrect tries. Errorlevels Too! With guest access
& Secure operation to prevent hacking etc... REQ's - 286,
200k HDD space, 400k RAM!
Hobbit,
L5
Abstract: L5 simply walks down Unix or DOS filesystems,
sort of like "ls -R" or "find" would, generating listings of
anything it finds there. It tells you everything it can about a
file's status, and adds on an MD5 hash of it. Its output is
rather "numeric", but it is a very simple format and is designed
to be post-treated by scripts that call L5.
Gary B. Edstrom, PGP
Abstract: PGP is a program that gives your electronic mail
something that it otherwise doesn't have: Privacy. It does this
by encrypting your mail so that nobody but the intended person
can read it. When encrypted, the message looks like a meaningless
jumble of random characters. PGP has proven itself quite capable
of resisting even the most sophisticated forms of analysis aimed
at reading the encrypted text.
Data Rescue Services,
ACSA
Software System
Abstract: The ACSA Software System is designed for IBM/PC
compatible hardware both as a means of access authorization to
the hard disk data and a universal means of "anti-virus"
protection. Shared use of a PC by several users can cause
problems of data protection of one user from intentional or
unintentional destruction (updating, copying etc) by other users.
"Virus" infection of computers is a special case of such
interference. This is quite frequently the trouble with the
beginners though sometimes even experienced programmers have to
face such problems, especially if they are working in the shared
mode. Now, just imagine that you are able: - to protect your COM,
EXE, BAT-files and the BOOT-record from updating; - to "close"
your sub-directories and/or files for other users (but not
necessarily for all of them), so that your files are either
absolutely inaccessible or have a Read-Only access; - to set the
limits of hard disk space for every user; - to make hard disk
inaccessible when booting from a floppy disk You will have all
these advantages with ACSA programming package!
Central Command Inc.,
AntiViral
ToolKit Pro (AVP)
Abstract: This package is the data base oriented
professional antiviral software - Antiviral Toolkit Pro ver. 2.0.
It can be used as conventional and/or professional (Pro)
antiviral system. It consist of four programs: 1. Antiviral
scanner/remover -V.EXE 2. Antiviral scanner/remover with database
editor -VPRO.EXE 3. Antiviral resident detector -D.COM 4.
Antiviral utilities -U.COM
McAfee Associates, ccp11.zip
Abstract: System access/boot/configuration. CCP Version
1.1 works on any system with 512Kb of memory and DOS 3.3 or
greater. One floppy disk is required for each system CCP is
installed on. CCP is not compatible with DOS 2.nn systems,
systems partitioned with a third-party disk partitioning program
such as SpeedStor or Disk Manager, or systems with a 'dual boot'
partition, such as DOS-Unix or DOS-OS/2. It is not compatible
with DR-DOS. CCP is not compatible with Windows 3.1
'32BitDiskAccess' (or FASTDISK) feature. Change your WIN.INI file
to read 32BitDiskAccess=OFF if it does not currently read
this.
Eugene Kim, eeklogin.zip
Abstract: Restricts certain commands for unwanted users.
Login is an extremely simple login program that helps protect
your computer. Login will prompt the user for a login name. If
the login name is 'root', Login will exit with an error-level of
0; all other login names result in an error-level of 1. Login is
meant for use in the AUTOEXEC.BAT file, and another batch file
that disables the appropriate commands.
Padgett Peterson, Ethcrd
(A related WWW
homepage exists for this item)
Keywords: packet driver, Novell SPX/IPX, MAC hardware
address
Abstract: Ethcrd is a simple tool. When executed from DOS,
a DOS box, or a network login script, it examined the system for
either a valid packet driver or, if that fails, a Novell SPX/IPX
driver. If found, it reports the type of driver, interrupt in
use, MAC hardware address (six octets) and the registered
manufacturer of the card.
Michael Ford, fakedos1.zip
Abstract: Restrict PC access w/password at C:>, u
config. This program will not deter a determined assault but it
will provide protection against some stupidity, and against an
attack by someone that is not too knowledgeable about computers.
At the least it will confuse someone and the longer it takes them
to figure it out the more likely they are of getting
caught.
Prof. Timo Salmi, Tommi Rintala, Hannu Hirvonen, Tuomas Eerola, Garbo
Archives
Keywords: anti-virus, utilities
Abstract: Ftp archive containing virus fighting utilities
and information. Highlights: Virus Protection system by Fridrik
Skulason, and PH's Virus Information Summary List,
HyperText
Central Command Inc.,
HS v3.5,
Boot Virus detection and repair
Abstract: HS v3.5 is a small program written to protect
against boot viruses. It checks for changes in the boot sectors
of your harddisk. It will find almost any boot virus, notify you
of the virus, and cold boot your machine after removing the
virus. A copy of the infected boot sector is stored for later
examination.
UniNova Services
Corporation, idle220.zip
Abstract: Basic PC password protection. The IDLE program
is a simple way of providing password security for a system.By
adding a line in the beginning of your AUTOEXEC.BAT file that
calls IDLE, you will stop unauthorized users from accessing your
system. The only way known to UniNova to get out of IDLE without
the password is to re-boot, which brings the user back to IDLE
anyway (assuming the program is called from the AUTOEXEC.BAT, as
recommended, on a DOS 5 [or earlier] system).
Doug Karl, KarlBridge
Abstract: The KarlBridge package by doug Karl. A program
that runs on a PC with two Ethernet boards, turning the PC into a
sophisticated, high-level packet-filtering bridge. It can filter
packets based on any specified protocol including IP, XNS,
DECNET, LAT, IPX, AppleTalk etc. Version 2.0
Bill Travis, lkmup251.zip
Abstract: Password protect PC from unauthorized users.
LOCK'M-UP was designed to password protect your Personal
Computer. The ease of use and colorful screens is what separates
LOCK'M-UP from other password security programs. LOCK'M-UP will
stop the casual user from gaining access to your computer, but is
not designed to thwart the most sophisticated hacker.
Scott Preston, login.zip
Abstract: Login password program for PCs.This program
encrypts your password so that the original password never
appears in plain text, even in memory after running this program.
The encryption algorithm is NOT publicly available.
LT Dale E. Wilson, USN, navypass.zip
Abstract: Password protection system (NARDAC, US Navy).
The NAVYPASS Software Package was designed to assist commands in
promoting ADP Security in their work environment. The program is
actually very simple, but at the same time very powerful.
Donar G E Alofs, Novell
Brute Force Hacker
Abstract: NOVELBFH is a brute force netware password
hacker, it will try all the combinations possible with the
characters you want it to try. NOVELBFH is part of the Donar GE
Alofs NOVELL SECURITY COLLECTION.
Helmut Dier, passw11.zip
Abstract: Password driver for CONFIG.SYS, w/src
.PASSWORD.SYS enables you to protect your Hard disk or Floppy
disk from not welcomed Users. If you have the problem that
several people enter your system without your permission, and you
are sick of that, then you could find this little program
useful.
Christoph Christ, passw13p.zip
Abstract: Password device driver for CONFIG.SYS V1.3 .
.PASSWORD.SYS enables you to protect your Hard disk or Floppy
disk from not welcomed Users. If you have the problem that
several people enter your system without your permission, and you
are sick of that, then you could find this little program useful.
This version cleans off a few bugs: -) some muttering of DOS
about wrong sector sizes with DOS-Versions earlier then 5.0 -) It
wasn't quite clear, if the driver "behaved well".
David Scheall, passwrd1.zip
Abstract: Password protect your system. This is a program
that will prompt a user for a password. The user entered password
will be validated against the password file specified in the
execution command line. PW.EXE disables the Control-C and the
Control-Break key sequence. A valid password must be entered or
the program will not continue.
John R. Petrocelli, Todd Hall, passwrd5.zip
Abstract: 'Password' device driver to lock PC. This
program is intended to produce a device driver (PASSWRD.SYS) that
that you include in your CONFIG.SYS file. This driver will ask
the user on machine startup to provide a password. The user is
repeatedly asked for the password until the correct one is
given.
Bob Montgomery, passwrd6.zip
Abstract: Install password on hard disk, w/ASM source.
This is a device driver to include in your CONFIG.SYS file to ask
the user for the password each time the machine is booted, or a
calling program (LOCK.COM) is run. It allows 3 tries, and then
locks up the machine if the incorrect password was given. It is a
simplification of PASSWRD5.SYS which was originally PWORD.SYS by
an unknown author.
John Jaeger, passwrd9.zip
Abstract: Simple password protection at boot-up. This
program is a major change to PASSWRD6.ARC that was supplied by
Bob Montgomery on 1/5/87. added all the necessary assumes,
segments, etc. as per his documentation and compiled it with
MASM.
Nick Zaikin Jr., Cyro Angeloff, pcl200.zip
Abstract: program to protect your PC from other people.
This program can be used to preserve your computer from other
people and hard hackers. The program is more reliable than ADM
ones. The SECURITY mode in the ADM program is easily switched off
- one has ONLY to load DOS from drive A: and after that by means
of PCTOOLS to change a single byte in the boot sector.
Solid Oak Software, pcsntry2.zip
Abstract: PC-Sentry v2.00b: Security for PCs &
networks.PC-Sentry is a collection of programs and utilities to
provide security and accountability on PC's and PC networks. The
heart of the system is PCS.EXE, a TSR (memory resident) program
that maintains daily log files of file based computer activity.
It will log all files opened, deleted, created, copied,
directories created and deleted, time changes, commands issued
from the DOS prompt, and much more. In addition, it will keep a
record of average keystrokes per minute and periods of keyboard
inactivity. Most logging functions can be toggled on or off at
load time to allow the user to customize the logging capabilities
of the program. PCS.EXE can also be loaded in a "Quiet" mode so
the user will never be aware it is running.
Michael Gallias, pxlgt100.zip
Abstract: Logs time and displays last time pgm was run.
This program logs the current time into a file. It stores the
last 170 times in a specified file. This is useful for your
AUTOEXEC.BAT because you can track when last someone used your
computer. If it boots up with the time it was last used, you can
know if someone used your computer while you were away.
Heath I Hunnicutt, secure10.zip
Abstract: Password protected access to subdirectories.
Secure is a TSR (memory resident) program that allows you to
exercise a greater degree of control over who or what accesses
various subdirectories of your MS-DOS formatted hard drive. In
short, you can select a directory to protect and all future
access to that directory requires the knowledge of a secret
password.
Peter Gutmann, Secure
FileSystem for DOS
Abstract: SFS (Secure FileSystem) is a set of programs
which create and manage a number of encrypted disk volumes, and
runs under both DOS and Windows. Each volume appears as a normal
DOS drive, but all data stored on it is encryped at the
individual-sector level. Encrypted volumes can be loaded and
unloaded as required, and can be quickly unloaded with a
user-defined hotkey, or automatically unloaded after a period of
inactivity. They can also be converted back to normal DOS
volumes, or have their contents destroyed. The documentation
includes an in-depth analysis of various security aspects of the
software, as well as fairly complete design and programming
details.
Spandan Choudury, slock21.zip
Abstract: Temp. locks DOS workstation while user is
away.This software effectively locks up a dos-station on a
temporary basis. Its use will allow a client to prevent others
from interrupting work or occupying a station should the client
be forcedto be away from it for some time. The optional comment
allows the client to specifically enter a clearly visible
appropriate statement on a screen window.
David Koblas, socks.cstc
Abstract: This program provides SOCKS access for standard
MS-Windows Mosaic 2.0alpha2 clients.
ESaSS BV, tbfence1.zip
Abstract: TBAVFence: Auto diskette protection/encryption.
TbFence is actually a transparent data encryption/decryption
mechanism. Once you have installed TbFence, all datagoing to the
diskette drive will be encrypted automatically, and all data read
from the diskette drive will be decrypted as well. This
background encryption and/or decryption is completely transparent
to the user. If you don't tell the user, he will not even notice
that something has been changed, until he tries to insert his
unauthorized game diskette. TbFence will simply refuse to read
from or write to this diskette. If the user copies information to
a diskette, this diskette can be read on other machines equipped
with TbFence, but when he tries to read the diskette at home, he
will find out that it is impossible to read it. He is however
still able to share the TbFenceddiskettes with other employees of
the company.
Viktor Instructional
Tools., thegate.zip
Abstract: Limits PC/application access to list of users.
The Gate is a low-security flexible package that allow to filter
access to computer and/or to the separate applications run by
batch files. The Gate creates log of the users, their passwords,
dates, time of start and finish, and time spent, either on the
whole computer or separate applications, run by batch
files.
ThunderBYTE, ThunderBYTE
Anti-Virus Utilities (A related WWW homepage exists for
this item)
Keywords: anti-virus utility
Abstract: ThunderBYTE Anti-Virus (TBAV) is a comprehensive
toolkit designed to protect against, and recover from, computer
viruses.
Dcypher, Pkzip
Password Finder
Abstract: This program replaces zipfile with the name of
the password protected zip file. If the file is not in the
current directory, replaces wordslist with the name of the
words-list file. The words-list file MUST begin and end with a
word, it can't have any other information or messages in it.
UNZIP will load in data from the words-list, search for the
first, then use the data before that, and so on.
Patricia M. Hoffman, HyperText
VSUM X9203
Abstract: With the June, 1991 release, the Virus
Information Summary List was converted from its original ASCII
list format into a custom, hypertext database format. With the
new format, the product name has been changed to HyperText VSUM.
The previous ASCII list product has been discontinued, and will
no longer be updated. The original ASCII format had become
extremely large and unwieldy, it was difficult for most people to
effectively use. Printing also had become a problem unless one
had a very high speed laser printer. More importantly, the
information presented in the ASCII version was never really
intended to be read sequentially as a book, but instead to be a
reference book or encyclopedia. The hypertext database version,
HyperText VSUM, solves these problems. HyperText VSUM also
supports direct links between related viruses and theor
individual virus entries. The Common Name Cross the virus entries
by the common names. Four additional cross references were
initially added in the Appendices section: Length Cross-Reference
and Origin Cross-Reference on the Appendices menu, as well as
Boot Sector Infectors and Stealth & Sub-Stealth Viruses via
the Viral Type Cross-Reference selection on the Appendices menu.
Additional crossreferences have been added as well, also located
on the Appendices menu. Virus entry format information can be
found on the Appendices menu under the selection "Virus Entry
Fields".
XLOCK Corporation, xlock132.zip
Abstract: Security system, prevents unauthorized access.
This program provides a means of securing a machine that has been
inactive for a pre-determined period of time. It also provides a
"hot-key" that will secure the machine while the operator is away
from the computer. It will display the versions of the XLOCK
modules, also will display all unsuccesfull log-on attempts, and
finally it will let you know that someone has TRIED to use your
machine!!
Built by Mark Crosbie
and Ivan
Krsul.
Security Archive Homepage.
COAST Project
(CERIAS)Page.
Purdue CS Dept page.
security-archive@cerias.purdue.edu (COAST Security
Archive)