(Page 5 of 5)   < Prev  1 2 3 4 5 

Category: Cryptography » E-mail

Lire
Added 2001-10-22
by Logreport Foundation
Lire is a pluggable log analyzer. It has analyzers for over 25 log file formats, ranging from Apache WWW log files to iptables firewall logs and CUPS printing logs. Reports are generated in 9 different output formats, ranging from Excel 95 to PDF to HTML, optionally with included graphs.

VisualSoft SecureDev
Added 2001-10-22
by VisualSoft Technologies
VisualSoft SecureDev is a comprehensive suite of cryptographic and secure data communication components. The components in this suite include VisualSoft Crypt, VisualSoft CryptPlus, VisualSoft Mail, VisualSoft HTTP, VisualSoft XMLSecure, and VisualSoft FSecure. VisualSoft SecureDev suite can be used to provide total security for eBusiness applications.

herbrip
Added 2001-10-22
by Phil Hunt
Herbrip is a command-line Python implementation of the Herbivore protocol, an initiative to encourage more people tor use encrypted email by making strong encryption almost totally effort-free for the user.

AirSnort
Added 2001-10-22
by Jeremy Bruestle and Blake Hegerle
AirSnort is a wireless LAN (WLAN) tool that recovers encryption keys. It operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered.

CryptoMail
Added 2001-10-22
by Joshua Teitelbaum
CryptoMail is an end-to-end secure email system.

Smart Sign 0.1.2 (SmartShell)
Added 2001-10-22
by Tommaso
SmartSign is a set of modules which allow integration of smartcard technology into an OpenCA based Public Key Infrastructure in order to provide smartcard-based digital signature and local authentication security services. Currently only Cyberflex is supported. It allows direct signing of e-mail and e-news from within Netscape using smartcards and supports signing of generic files from command line. The package includes a PAM module too, which allows system administrators to integrate smartcard-based authentication for local users. Finally, a command line interactive shell supports all operations on the card, and can be used to automate some tasks on the card.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus