(Page 4 of 5)   < Prev  1 2 3 4 5  Next >

Category: Cryptography » E-mail

kuvert
Added 2002-05-08
by Alexander Zangerl
kuvert automatically signs and/or encrypts outgoing mail using the PGP/MIME standard (rfc2015), based on the availability of the recipient's key in your keyring. It does not store passphrases on disk, but keeps them in memory; if available, it prefers to store passphrases with quintuple-agent. It works as a wrapper around your MTA.

Anubis
Added 2002-05-06
by Wojciech Polak
Anubis is an outgoing mail processor. It goes between the MUA (Mail User Agent) and the MTA (Mail Transport Agent), and can perform various sorts of processing and conversion on-the-fly in accordance with the sender's specified rules, based on a highly configurable regular expressions system. It operates as a proxy server, and can edit outgoing mail headers, encrypt or sign mail with the GnuPG, build secure SMTP tunnels using the TLS/SSL encryption even if your mail user agent doesn't support it, or tunnel a connection through a SOCKS proxy or WinGate proxy server. It also supports anonymous remailers.

Tagged Message Delivery Agent
Added 2002-04-24
by Jason R. Mastaler
The Tagged Message Delivery Agent (TMDA) reduces the amount of SPAM/UCE (junkmail) you receive. It combines a "whitelist" (for known/trusted senders), a "blacklist" (for undesired senders), and a cryptographically-enhanced confirmation system (for unknown, but legitimate, senders).

keystory
Added 2002-04-02
by Frank J. Tobin
keystory, by analyzing email history, gathers data on the usage of OpenPGP signatures, and provides information to imperfectly, but practically complement the web of trust, answering questions such as "What keys has foo@bar.baz.com used, where and when?"

Email CHAOS
Added 2002-04-01
by IRG
What can you do with CHAOS? Easily encrypt files into your personal data archive. You can be confident that the data is safely secured. The additional special protection completely excludes an opportunity of selection of the password to the encrypted information at use of the generator of the passwords and keys.

CryptNET_Keyserver
Added 2002-03-29
by VAB
CKS is an openPGP (RFC2440) compliant public key server. It is currently under development. It is written in C, and runs on Linux. It uses PostgreSQL for key storage, and supports the hkp protocol (it can interface with GnuPG and NAI PGP). The keyserver is mostly functional, and there is a link to a running copy on the homepage.

vncrypt
Added 2002-01-23
by Andrey Sverdlichenko
This is cryptographic disk driver for FreeBSD. It provides transparent encryption and decryption of selected devices. It is based on vn(4).

gpgsig
Added 2001-11-16
by damien
gpgsig can retrieve a key from the server, sign the key, send the signed key to the server, mail the signed key to its owner, or update your keys.

DBG
Added 2001-10-29
by Dmitri Dmitrienko
DBG is full-featured native PHP debugger. DBG makes it easy to discover problems and bugs in a PHP script. It has the ability to back-track errors, and it shows local variables and parameters which have been passed to all nested function calls at any point of execution. Among other things, DBG allows you to execute script in a step-by-step manner, set breakpoints, evaluate expressions, and watch variables.

Ensuredmail
Added 2001-10-22
by Ensuredmail, Inc.
Privacy software that: protects email, attachments, local files; supports existing email accounts; supports Microsoft Outlook 97,98,2000, Outlook Express 4.0, 5.0; integrates with web-mail systems, provides reliable read-receipts,can prevent recipients from forwarding sensitive data.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus