(Page 5 of 54)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >

Category: Cryptography

Sekritz
Added 2005-08-04
by Black List Software
Steganography pronounced Steg-Uh-Nog-Ruh-Fee, is the art of ensconcing information meant to be secret. Unlike cryptography, steganography makes an attempt to conceal the information in plain sight. Instead of creating an incredibly new and annoying encryption algorithm, steganographers will keep the original message intact, however, hidden from the unsuspecting eye.

Proactive System Password Recovery
Added 2005-07-30
by ElcomSoft Co.Ltd.
Proactive System Password Recovery is a program to recover all types of Windows passwords: logon password (when user is logged on and has Admin privileges), screensaver password, .NET Passport password, RAS and dial-up passwords, passwords to shared resources, SYSKEY startup password, passwords stored in cached credentials, Wireless (WEP and WPA-PSK) encryption keys etc. The program also shows all users and groups (with their properties), allows to run any programs in other user's context, show password history hashes, read password hashes from SAM and SYSTEM files, read Protected Storage records, decrypt Windows scripts, reveal passwords hidden under the asterisks, enable disabled controls, and run brute-force and dictionary attacks on PWL files (Windows 9x). Finally, it shows product IDs and CD keys for Windows, Microsoft Office and other Microsoft software installed.

Enig3
Added 2005-04-11
by CCC Morocco Team
Enig3 is a free cryptography tool that can encrypt/decrypt content/data using your own private generated 128 Bits Enig3-Key, was developed on CCC-Morocco Labs, using the most complex cryptographic methodologies. It uses a Flow-Encoding technique which is done in 3 phases...

TextKeeper
Added 2005-03-21
by HardwareCrasher
Encrypts text using numeric combinations and two algorithms, One of the algorithms uses 5 different numeric combinations.

Secure Hive
Added 2005-02-04
by Secure Hive
What Does Secure Hive Enterprise Offer? Encryption of part, or entire, Word documents, Excel worksheets or PowerPoint presentations through Secure Hive's integration with Microsoft Office. Encryption of part, or entire, content of common documents (such as Notepad, WordPad), email messages and instant messages, including mixed text and graphics, with Secure Hive's Clipboard Encryption feature.

Dekart Private Disk
Added 2004-11-22
by Dekart
Private Disk - is an easy-to-use, reliable, user-friendly and smart program that lets you create encrypted disk partitions (drive letters) to keep your private and confidential data secure. Uses 256-bit AES encryption.

Random Number Generator Pro
Added 2004-11-09
by Segobit Software
Random Number Generator is a Windows based application designed to generate random numbers. Program allow users choose lower and upper limits and increments of the numbers. Limits can be positive or negative values. User can exclude digits from generated random numbers. Random numbers can be edit and copied to the clipboard for pasting into other applications. Random Number Generator can print all random numbers or save numbers as file. Random Number Generator will generate to 9999 numbers at the time.

ByteShelter I
Added 2004-10-13
by MazZoft NDA
This steganography tools lets you conceal data in Outlook e-mail messages and .doc files.

PHP_Sec (Wasp Project)
Added 2004-10-07
by Jose Antonio Coret (Joxean Koret)
PHP_Sec is a library for PHP, designed to detect possible Web attacks, use encryption and log information quickly and easily. The library acts as an IDS but at script level detecting possible SQL Injection, Cross Site Scripting, Directory Traversal, Evasion Techniques and various other vulnerabilties. By adding 2 lines of code we can protect any application PHP application in an easy way.

Extreme Editor:
Added 2004-10-04
by Uri Fridman
multi-tabbed ASCII editor with encryption capabilities. Encryption of edited text and clipboard using Twofish.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus