creates an extra socket for syslog (e.g. in a chroot jail)
Developed for systems that have an older version of syslogd which does not support multiple sockets (e.g. via the '-a' flag). Performs extensive message validation according to RFC 3164
Apache security module. Makes Apache configurable to work as diffrent user, group and diffrent chroot() environment for each VirtualServer and for ~user request. Designed mostly for ISP to make Apache secure.
chroot_safe, a tool to chroot any application in a sane manner without requring binaries,
shared libraries etc within the chroot or any support from the application. Works with any
dynamically linked application.
Eselstall Secure Environment to Launch Software you don't Trust At aLL:
Combined chroot/setuid tool to easily launch background processes (servers) in a confined environment. Eliminates the need for su in the changeroot directory.
Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
The sandbox system call API is a simple yet powerful mechanism for
confining untrusted code. It is similar to chroot() and BSD jails, but has
much greater flexibility and expressive power. The code is mostly complete
but not yet fully functional.
chruid is a small but flexible replacement for a chroot + su kombo. i wrote it because i was in the need to chroot processes and having them run under a non-privileged uid/gid without having to install su (which would include pam, nss, ... overhead on som
This project's single goal is to maintain a patch that allows chrooting of users in OpenSSH.
This patch will cause sshd to chroot when it encounters the magic token '/./' in a users home directory. The directory portion before the token is the direc