(Page 3 of 5)   < Prev  1 2 3 4 5  Next >

Category: Cryptography » E-mail

Email
Added 2003-08-29
by Geekoid
Email sends email to remote SMTP servers via the command line, which makes it useful in cron jobs. It will send to any RFC standard remote ESMTP server, and will allow you to encrypt, sign, and design your message on the fly. It has the capability to use signature files with dynamic options, address book functionality, and users can also attach pictures, binary files, documents, or whatever they want. It is completely compatible with GNUPG for encryption and signing, and is easy to configure and use.

PHPki
Added 2003-08-19
by E. Roadcap
PHPki is an Open Source Web application for managing a Public Key Infrastructure within a small organization. It provides a mechanism for the centralized creation and management of digital certificates for use with S/MIME-enabled email cilents. It will not create server, browser, or code signing certificates.

FirePay
Added 2003-08-11
by flamingcow
FirePay is an implementation of the HashCash/MIME (application/postage-hashcash) specification. HashCash is an anti-spam, anti-DoS system for email. The concept centers around the sender of the mail completing a computationally expensive task (in this case, generating hash collisions) that the recipient can verify very quickly. This allows the sender to "pay" for transport in CPU cycles, creating artificial scarcity. Programs are included to add payment to messages (for the sender) and to verify message payment (for the recipient).

T/bone SecureMail Gateway
Added 2003-08-08
by bone labs
T/bone SecureMail Gateway provides digital signatures and encryption for the entire email traffic of a company with a single organizational certificate. It is a server-based solution which works transparently for end users. T/bone automatically finds the certificates of external users or companies via the Internet. Secure email traffic to customers, suppliers, and partners is easily established, no matter whether or not they also deploy T/bone. Packages for Red Hat, SuSE, and Debian GNU/Linux are available for download.

Web of Trust Statistics and Pathfinder
Added 2003-03-28
by Jörgen Cederlöf
Web of Trust Statistics and Pathfinder (Wotsap) is a program for graphing all the shortest paths between two keys in the OpenPGP Web of Trust. These paths can be presented as text or as PNG images. Additionally, it can generate statistics about keys and the whole strongly-connected set.

GPG-Ezmlm encrypted mailing list
Added 2002-11-28
by Todd MacDermid
GPG-Ezmlm contains a set of scripts which adds the ability to handle OpenPGP-encrypted email to Ezmlm. Email encrypted to the list key is re-encrypted to the keys of the subscribers. Key exchange during list subscription is supported.

Secure Cryptographic Instant Messaging
Added 2002-08-07
by The Project SCIM team
The Project SCIM application allows you to send Encrypted Instant Messages to your friends and other contacts. The software is free for non-commercial users and contains a load of cool features.

echolot-pinger
Added 2002-07-23
by Peter Palfrader (Weasel)
Echolot-pinger is a pinger for anonymous remailers, which works by regularly sending messages through remailers to check their reliability. It then calculates reliability statistics which are used by remailer clients to choose the chain of remailers to use. Additionally, it collects configuration parameters and the keys of all remailers, and offers them in a format readable by remailer clients.

Mailcrypt
Added 2002-07-22
by Brian Warner
Mailcrypt is an Emacs Lisp package which provides a simple interface to public key cryptography with PGP/GPG. Mailcrypt makes strong cryptography a fully integrated part of your normal mail and news handling environment.

Enigma Mailer
Added 2002-05-17
by Fang
Enigmailer allows you to send enciphered email with an optional password hint. The recipient receives a mail message with a link to the script to facilitate deciphering. It comes in two versions, one for enciphering mail, the other also supporting multiple recipients, read receipts, attachments, and logging to allow the recipient to verify the credentials of the sender. Unlike other secure mail systems, it allows you to use your existing email address rather than forcing you to setup and use yet another one, and it does not require the recipient to have software installed on their machine (other than a browser).

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus