AFICK 2.10-1

AFICK 2.10-1 Download Summary

  • Language: Perl
  • Platform: Windows / Linux / Mac OS / BSD / Solaris
  • License: GPL - GNU Public License
  • Databases: N/A
  • Downloads: 437
  • Released: May 30, 2007

AFICK 2.10-1 Description

Afick is a security tool, very close from the well known tripwire. It allows to monitor the changes on your files systems, and so can detect intrusions.

Features:
- portable without any change to all common operating systems (windows, unix ...)
- easy install : no need to compile or to install many others tools
- fast
- display new/deleted/modified files
- display dangling links
- may be used by any user
- any number of base and config
- config file with exceptions and jokers

AFICK Bookmark

Hyperlink code:
Hyperlink for Forum code:

AFICK 2.10-1 Script Download Notice

Top 4 Download periodically updates information of AFICK 2.10-1 script from the developer, but some information may be slightly out-of-date.

Our script download links are directly from our mirrors or publisher's website. AFICK 2.10-1 torrent files or shared files from free file sharing and free upload services, including Rapidshare, MegaUpload, YouSendIt, MailBigFile, DropSend, HellShare, HotFile, FileServe, MediaMax, zUpload, MyOtherDrive, SendSpace, DepositFiles, Letitbit, LeapFile, DivShare or MediaFire, are not allowed!

Open Source Tripwire

... Source Tripwire software is a security and data integrity tool useful for monitoring and alerting on specific file change(s) on a range of systems. ...

Google Hack Honeypot

... the honeypot. The honeypot connects to a configuration file, and the configuration file writes to a log file which is chosen during configuration. The log file contains information about the host, including IP address, ... agent. Using the information gathered in the log file, an administrator can learn more about attackers doing ...

GPG Crypter

... of text entered into the programs inputfield and file encryption and decryption. It was first intended for ... services. But it can also be used for file-encryption and as an east it can email encryption. ...

Program Guard

... can be specified by listing them in a file (Static Mode) by querying the user (Query Mode). In Query Mode, when a program that is unknown to Program Guard attempts to access an Internet IP address, Program Guard displays the Program Guard Dialog Box.In addition to providing connection information, this ...

Cryptonit

... bits - Signature / Verification: ensures the integrity (tamper-proof) of your documents - Self-encryption : encrypt your documents using a password - Address book: save and organize your contacts for easy and secure communications - Multi-user: Cryptonit can manage multiple user accounts - Multi-lingual: Cryptonit ...