COAST Security Archive Logo Category Index: /pub/tools/dos


No Pointing!

This WWW page was generated automatically. Link makers should not point their links to this page. If you must, please make a link to the search entry point.
Adafinn Software Inc., GateWAY 1.2
Keywords: password locking, access control
Abstract: GateWAY provides a way of restricting access by using a PASSWORD. Up to 30 users, each with different passwords. Options include - colour, welcome message, passwords, password character, incorrect tries. Errorlevels Too! With guest access & Secure operation to prevent hacking etc... REQ's - 286, 200k HDD space, 400k RAM!
Hobbit, L5
Abstract: L5 simply walks down Unix or DOS filesystems, sort of like "ls -R" or "find" would, generating listings of anything it finds there. It tells you everything it can about a file's status, and adds on an MD5 hash of it. Its output is rather "numeric", but it is a very simple format and is designed to be post-treated by scripts that call L5.
Gary B. Edstrom, PGP
Abstract: PGP is a program that gives your electronic mail something that it otherwise doesn't have: Privacy. It does this by encrypting your mail so that nobody but the intended person can read it. When encrypted, the message looks like a meaningless jumble of random characters. PGP has proven itself quite capable of resisting even the most sophisticated forms of analysis aimed at reading the encrypted text.
Data Rescue Services, ACSA Software System
Abstract: The ACSA Software System is designed for IBM/PC compatible hardware both as a means of access authorization to the hard disk data and a universal means of "anti-virus" protection. Shared use of a PC by several users can cause problems of data protection of one user from intentional or unintentional destruction (updating, copying etc) by other users. "Virus" infection of computers is a special case of such interference. This is quite frequently the trouble with the beginners though sometimes even experienced programmers have to face such problems, especially if they are working in the shared mode. Now, just imagine that you are able: - to protect your COM, EXE, BAT-files and the BOOT-record from updating; - to "close" your sub-directories and/or files for other users (but not necessarily for all of them), so that your files are either absolutely inaccessible or have a Read-Only access; - to set the limits of hard disk space for every user; - to make hard disk inaccessible when booting from a floppy disk You will have all these advantages with ACSA programming package!
Central Command Inc., AntiViral ToolKit Pro (AVP)
Abstract: This package is the data base oriented professional antiviral software - Antiviral Toolkit Pro ver. 2.0. It can be used as conventional and/or professional (Pro) antiviral system. It consist of four programs: 1. Antiviral scanner/remover -V.EXE 2. Antiviral scanner/remover with database editor -VPRO.EXE 3. Antiviral resident detector -D.COM 4. Antiviral utilities -U.COM
McAfee Associates, ccp11.zip
Abstract: System access/boot/configuration. CCP Version 1.1 works on any system with 512Kb of memory and DOS 3.3 or greater. One floppy disk is required for each system CCP is installed on. CCP is not compatible with DOS 2.nn systems, systems partitioned with a third-party disk partitioning program such as SpeedStor or Disk Manager, or systems with a 'dual boot' partition, such as DOS-Unix or DOS-OS/2. It is not compatible with DR-DOS. CCP is not compatible with Windows 3.1 '32BitDiskAccess' (or FASTDISK) feature. Change your WIN.INI file to read 32BitDiskAccess=OFF if it does not currently read this.
Eugene Kim, eeklogin.zip
Abstract: Restricts certain commands for unwanted users. Login is an extremely simple login program that helps protect your computer. Login will prompt the user for a login name. If the login name is 'root', Login will exit with an error-level of 0; all other login names result in an error-level of 1. Login is meant for use in the AUTOEXEC.BAT file, and another batch file that disables the appropriate commands.
Padgett Peterson, Ethcrd (A related WWW homepage exists for this item)
Keywords: packet driver, Novell SPX/IPX, MAC hardware address
Abstract: Ethcrd is a simple tool. When executed from DOS, a DOS box, or a network login script, it examined the system for either a valid packet driver or, if that fails, a Novell SPX/IPX driver. If found, it reports the type of driver, interrupt in use, MAC hardware address (six octets) and the registered manufacturer of the card.
Michael Ford, fakedos1.zip
Abstract: Restrict PC access w/password at C:>, u config. This program will not deter a determined assault but it will provide protection against some stupidity, and against an attack by someone that is not too knowledgeable about computers. At the least it will confuse someone and the longer it takes them to figure it out the more likely they are of getting caught.
Prof. Timo Salmi, Tommi Rintala, Hannu Hirvonen, Tuomas Eerola, Garbo Archives
Keywords: anti-virus, utilities
Abstract: Ftp archive containing virus fighting utilities and information. Highlights: Virus Protection system by Fridrik Skulason, and PH's Virus Information Summary List, HyperText
Central Command Inc., HS v3.5, Boot Virus detection and repair
Abstract: HS v3.5 is a small program written to protect against boot viruses. It checks for changes in the boot sectors of your harddisk. It will find almost any boot virus, notify you of the virus, and cold boot your machine after removing the virus. A copy of the infected boot sector is stored for later examination.
UniNova Services Corporation, idle220.zip
Abstract: Basic PC password protection. The IDLE program is a simple way of providing password security for a system.By adding a line in the beginning of your AUTOEXEC.BAT file that calls IDLE, you will stop unauthorized users from accessing your system. The only way known to UniNova to get out of IDLE without the password is to re-boot, which brings the user back to IDLE anyway (assuming the program is called from the AUTOEXEC.BAT, as recommended, on a DOS 5 [or earlier] system).
Doug Karl, KarlBridge
Abstract: The KarlBridge package by doug Karl. A program that runs on a PC with two Ethernet boards, turning the PC into a sophisticated, high-level packet-filtering bridge. It can filter packets based on any specified protocol including IP, XNS, DECNET, LAT, IPX, AppleTalk etc. Version 2.0
Bill Travis, lkmup251.zip
Abstract: Password protect PC from unauthorized users. LOCK'M-UP was designed to password protect your Personal Computer. The ease of use and colorful screens is what separates LOCK'M-UP from other password security programs. LOCK'M-UP will stop the casual user from gaining access to your computer, but is not designed to thwart the most sophisticated hacker.
Scott Preston, login.zip
Abstract: Login password program for PCs.This program encrypts your password so that the original password never appears in plain text, even in memory after running this program. The encryption algorithm is NOT publicly available.
LT Dale E. Wilson, USN, navypass.zip
Abstract: Password protection system (NARDAC, US Navy). The NAVYPASS Software Package was designed to assist commands in promoting ADP Security in their work environment. The program is actually very simple, but at the same time very powerful.
Donar G E Alofs, Novell Brute Force Hacker
Abstract: NOVELBFH is a brute force netware password hacker, it will try all the combinations possible with the characters you want it to try. NOVELBFH is part of the Donar GE Alofs NOVELL SECURITY COLLECTION.
Helmut Dier, passw11.zip
Abstract: Password driver for CONFIG.SYS, w/src .PASSWORD.SYS enables you to protect your Hard disk or Floppy disk from not welcomed Users. If you have the problem that several people enter your system without your permission, and you are sick of that, then you could find this little program useful.
Christoph Christ, passw13p.zip
Abstract: Password device driver for CONFIG.SYS V1.3 . .PASSWORD.SYS enables you to protect your Hard disk or Floppy disk from not welcomed Users. If you have the problem that several people enter your system without your permission, and you are sick of that, then you could find this little program useful. This version cleans off a few bugs: -) some muttering of DOS about wrong sector sizes with DOS-Versions earlier then 5.0 -) It wasn't quite clear, if the driver "behaved well".
David Scheall, passwrd1.zip
Abstract: Password protect your system. This is a program that will prompt a user for a password. The user entered password will be validated against the password file specified in the execution command line. PW.EXE disables the Control-C and the Control-Break key sequence. A valid password must be entered or the program will not continue.
John R. Petrocelli, Todd Hall, passwrd5.zip
Abstract: 'Password' device driver to lock PC. This program is intended to produce a device driver (PASSWRD.SYS) that that you include in your CONFIG.SYS file. This driver will ask the user on machine startup to provide a password. The user is repeatedly asked for the password until the correct one is given.
Bob Montgomery, passwrd6.zip
Abstract: Install password on hard disk, w/ASM source. This is a device driver to include in your CONFIG.SYS file to ask the user for the password each time the machine is booted, or a calling program (LOCK.COM) is run. It allows 3 tries, and then locks up the machine if the incorrect password was given. It is a simplification of PASSWRD5.SYS which was originally PWORD.SYS by an unknown author.
John Jaeger, passwrd9.zip
Abstract: Simple password protection at boot-up. This program is a major change to PASSWRD6.ARC that was supplied by Bob Montgomery on 1/5/87. added all the necessary assumes, segments, etc. as per his documentation and compiled it with MASM.
Nick Zaikin Jr., Cyro Angeloff, pcl200.zip
Abstract: program to protect your PC from other people. This program can be used to preserve your computer from other people and hard hackers. The program is more reliable than ADM ones. The SECURITY mode in the ADM program is easily switched off - one has ONLY to load DOS from drive A: and after that by means of PCTOOLS to change a single byte in the boot sector.
Solid Oak Software, pcsntry2.zip
Abstract: PC-Sentry v2.00b: Security for PCs & networks.PC-Sentry is a collection of programs and utilities to provide security and accountability on PC's and PC networks. The heart of the system is PCS.EXE, a TSR (memory resident) program that maintains daily log files of file based computer activity. It will log all files opened, deleted, created, copied, directories created and deleted, time changes, commands issued from the DOS prompt, and much more. In addition, it will keep a record of average keystrokes per minute and periods of keyboard inactivity. Most logging functions can be toggled on or off at load time to allow the user to customize the logging capabilities of the program. PCS.EXE can also be loaded in a "Quiet" mode so the user will never be aware it is running.
Michael Gallias, pxlgt100.zip
Abstract: Logs time and displays last time pgm was run. This program logs the current time into a file. It stores the last 170 times in a specified file. This is useful for your AUTOEXEC.BAT because you can track when last someone used your computer. If it boots up with the time it was last used, you can know if someone used your computer while you were away.
Heath I Hunnicutt, secure10.zip
Abstract: Password protected access to subdirectories. Secure is a TSR (memory resident) program that allows you to exercise a greater degree of control over who or what accesses various subdirectories of your MS-DOS formatted hard drive. In short, you can select a directory to protect and all future access to that directory requires the knowledge of a secret password.
Peter Gutmann, Secure FileSystem for DOS
Abstract: SFS (Secure FileSystem) is a set of programs which create and manage a number of encrypted disk volumes, and runs under both DOS and Windows. Each volume appears as a normal DOS drive, but all data stored on it is encryped at the individual-sector level. Encrypted volumes can be loaded and unloaded as required, and can be quickly unloaded with a user-defined hotkey, or automatically unloaded after a period of inactivity. They can also be converted back to normal DOS volumes, or have their contents destroyed. The documentation includes an in-depth analysis of various security aspects of the software, as well as fairly complete design and programming details.
Spandan Choudury, slock21.zip
Abstract: Temp. locks DOS workstation while user is away.This software effectively locks up a dos-station on a temporary basis. Its use will allow a client to prevent others from interrupting work or occupying a station should the client be forcedto be away from it for some time. The optional comment allows the client to specifically enter a clearly visible appropriate statement on a screen window.
David Koblas, socks.cstc
Abstract: This program provides SOCKS access for standard MS-Windows Mosaic 2.0alpha2 clients.
ESaSS BV, tbfence1.zip
Abstract: TBAVFence: Auto diskette protection/encryption. TbFence is actually a transparent data encryption/decryption mechanism. Once you have installed TbFence, all datagoing to the diskette drive will be encrypted automatically, and all data read from the diskette drive will be decrypted as well. This background encryption and/or decryption is completely transparent to the user. If you don't tell the user, he will not even notice that something has been changed, until he tries to insert his unauthorized game diskette. TbFence will simply refuse to read from or write to this diskette. If the user copies information to a diskette, this diskette can be read on other machines equipped with TbFence, but when he tries to read the diskette at home, he will find out that it is impossible to read it. He is however still able to share the TbFenceddiskettes with other employees of the company.
Viktor Instructional Tools., thegate.zip
Abstract: Limits PC/application access to list of users. The Gate is a low-security flexible package that allow to filter access to computer and/or to the separate applications run by batch files. The Gate creates log of the users, their passwords, dates, time of start and finish, and time spent, either on the whole computer or separate applications, run by batch files.
ThunderBYTE, ThunderBYTE Anti-Virus Utilities (A related WWW homepage exists for this item)
Keywords: anti-virus utility
Abstract: ThunderBYTE Anti-Virus (TBAV) is a comprehensive toolkit designed to protect against, and recover from, computer viruses.
Dcypher, Pkzip Password Finder
Abstract: This program replaces zipfile with the name of the password protected zip file. If the file is not in the current directory, replaces wordslist with the name of the words-list file. The words-list file MUST begin and end with a word, it can't have any other information or messages in it. UNZIP will load in data from the words-list, search for the first, then use the data before that, and so on.
Patricia M. Hoffman, HyperText VSUM X9203
Abstract: With the June, 1991 release, the Virus Information Summary List was converted from its original ASCII list format into a custom, hypertext database format. With the new format, the product name has been changed to HyperText VSUM. The previous ASCII list product has been discontinued, and will no longer be updated. The original ASCII format had become extremely large and unwieldy, it was difficult for most people to effectively use. Printing also had become a problem unless one had a very high speed laser printer. More importantly, the information presented in the ASCII version was never really intended to be read sequentially as a book, but instead to be a reference book or encyclopedia. The hypertext database version, HyperText VSUM, solves these problems. HyperText VSUM also supports direct links between related viruses and theor individual virus entries. The Common Name Cross the virus entries by the common names. Four additional cross references were initially added in the Appendices section: Length Cross-Reference and Origin Cross-Reference on the Appendices menu, as well as Boot Sector Infectors and Stealth & Sub-Stealth Viruses via the Viral Type Cross-Reference selection on the Appendices menu. Additional crossreferences have been added as well, also located on the Appendices menu. Virus entry format information can be found on the Appendices menu under the selection "Virus Entry Fields".
XLOCK Corporation, xlock132.zip
Abstract: Security system, prevents unauthorized access. This program provides a means of securing a machine that has been inactive for a pre-determined period of time. It also provides a "hot-key" that will secure the machine while the operator is away from the computer. It will display the versions of the XLOCK modules, also will display all unsuccesfull log-on attempts, and finally it will let you know that someone has TRIED to use your machine!!
_____ O Built by Mark Crosbie and Ivan Krsul. Security Archive Page Security Archive Homepage. COAST Homepage COAST Project (CERIAS)Page. Purdue CS Homepage Purdue CS Dept page.
security-archive@cerias.purdue.edu (COAST Security Archive)