- PGP Keys
- Vossen's Law
- Firewall Rules
- Home Net Security
- Snort Books
- Sec Tools
- Honeypot Stats
- Firewall Stats
- IP Calcs
- SME Server
- Backup (DI-30)
- Win Tools
- Win. Shell Scripting
- POSIX Redirection
Everything listed on this page is free, unless otherwise noted (or
unless I goofed). I'll add more to this page as I have time.
You need to use a password database because humans are bad a remembering good passwords, you can't share passwords among sites, and so you need to have a lot of passwords. Some useful thoughts on this include:
There are a great many password databases out there these days. I personally don't trust any of the cloud or browser-based ones, because anything automated is that much easier to crack in to. It's a few extra steps to manually copy & paste the password from the manager into the correct fields, but it's a lot more secure.
Password Safe is a free utility originally from Bruce Schneier and Counterpane Labs which
allows you to keep your passwords securely encrypted on your computer. A
single Safe Combination--just one thing to remember--unlocks them all.
Check Password Safe's releases to find the newest version.
- KeePass seems to be another good one, and it has many cross-platform variations to chose from.
- See my random password/pin
generator (written in Perl). It also creates unpronounceable names
for aliens, for when you're writing SciFi and get stuck for a name... ;-)
There's a more up-to-date list at 2019 Best Packet Sniffers (10 Packet Analyzers Reviewed)@lahmstache UPDATED: June 21, 2019.
UNIX Clients and Servers
Windows Clients and Servers
Other Lists of Ports
(1) Winpcap is a
libpcap-compatible library for Windows. Libpcap is the basis for most UNIX
sniffer and packet tools, such as namp, nc, tcpdump and dsniff.
Check out the
OpenBSD FAQ relating to IPFilter for a VERY good and clear example
of IPFiltering, which is similar to the Linux IPTables or IPChains, and
which is a great example of firewall rules in action! See also:
- The OpenBSD project produces a FREE,
multi-platform 4.4BSD-based UNIX-like operating system. Our efforts
emphasize portability, standardization, correctness, proactive security
and integrated cryptography. OpenBSD supports binary emulation of most
programs from SVR4 (Solaris), FreeBSD, Linux, BSD/OS, SunOS and
- IPFilter, the IP Filter HOWTO,
- I have combined my LogSwap and CPFWBack tools, and added
my extract_patch tool into CPFW1TK--the Check Point Firewall-1
Tool Kit. LogSwap and CPFWBack work under both Windows and UNIX.
Extract_patch is unnecessary under UNIX.
(288,965 bytes) has the scripts and all other binaries needed to run. It
also includes the UNIX scripts just for fun, and it has
some other bonus stuff. It is a self-extracting ZIP archive.
(10,251 bytes) just has the UNIX scripts and ReadMe files.
Extract_patch was created for extracting Check Point patches
under Windows, without installing WinZip,
since Check Point are now distributing all patches in TGZ format. But it
will work for any TGZ (or .tar.gz, or .gz or .tar) you wish to extract
under Windows, without having to install WinZip. It combines Win32 ports of
the GNU tar.exe, gzip.exe and md5sum.exe utilities, so you can unpack and
verify *.tgz files.
LogSwap archives or "rolls" Firewall-1 logs. It
obsolete.com, audit.com and
gzip.exe for Win32.
CPFWBack greatly automates the annoying process of backing up
Firewall-1 configurations. It includes CPFWBack.cmd, zip.exe,
vdate.exe for Win32 and CPFWBack.sh for UNIX.
- I've also created an add-on called
jpcshrc for the default csh
configuration in Nokia's IPSO 3.4.1-FCS5. It sets the csh prompt to your
current working directory, and add some aliases (mostly DOS commands,
since I can't remember what OS I'm using).
The Check Point User Group including the old Phoneboy site.
- Essential Check Point FireWall-1, ISBN 0201699508, written by
Welch-Abernathy (AKA PhoneBoy), owner/operator of the above
FireWall-1 FAQ site. There is also Essential Check Point FireWall-1
NG in the works, probably available in early 2004.
- Tom Horsley's NTP Time for
Windows is a nice NTP client program. It is free, but is a client only,
and can be configured to talk to only one NTP server at a time. NTP works
much better when referencing a pool of servers. BUT, it allows you to use
NTP to time-sync a hardened NT Firewall server. The NT Resource kit
TimeServ will not run
with the NT Workstation service disabled or removed (which it should be
on a firewall!!!)
"is a perl script to summarise FW1 logs making it easier to see what
services are being blocked or allowed through your firewall."
converts those annoying WatchGuard *.WLS files to Self-Extracting archives.
I have much more information on this topic, and will post references as
I have time.
- Securing IIS 5.0 Using Batch-Oriented Command Files,
- Securing IIS 5.0 Using Batch-Oriented Command Files,
the tools. This package is essential to any attempt to secure Win 2000 or NT via script. It includes: auditpol.exe, CryptPwd.exe,
passprop.exe, Reg.exe, regini.exe, xcacls.exe.
- The Art and Science of Web Server Tuning with Internet Information Services 5.0
- A small write-up
about the IIS 4 and IIS 5 Lockdown Tool and the download
page for it.
the Microsoft Network Security Hotfix Checker, which is a command-line tool that administrators can use to centrally assess a computer or group of computers for the presence or absence of security patches. You can use the Hfnetchk tool to assess patch status for the Windows NT 4.0 and Windows 2000 operating systems, as well as hotfixes for Internet Information Server 4.0 (IIS), Internet Information Services 5.0 (IIS), SQL Server 7.0, and SQL Server 2000 (including Microsoft Data Engine [MSDE]), and Internet Explorer 5.01 or later.
- Microsoft Personal Security Advisor
(MPSA) "is an easy to use web application that will help you secure your Windows NT 4.0 and Windows 2000 computer system. Simply navigate to the MPSA site and press the Scan Now button to receive a detailed report of your computer's security settings and recommendations for improvement."
More of a SOHO than corporate focus. (Curiously, this does not seem to work too well using Netscape. I
- Migrating Microsoft® Hotmail® from FreeBSD to Microsoft Windows® 2000 Technical Case Study,
this is just kind of interesting, in scope if nothing else.