(Page 5 of 26)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >

Category: Cryptography » Data Encryption

ePointPGP
Added 2004-03-08
by Daniel Nagy
ePointPGP provides limited OpenPGP functionality for Java applications and applets, using the available crypto providers rather than implementing its own. It is extremely lightweight, and functionality that is not required can be safely left out.

SILC (Secure Internet Live Conferencing)(Toolkit)
Added 2004-03-02
by Priikone
SILC (Secure Internet Live Conferencing) is a protocol which provides secure conferencing services in the Internet over insecure channels. SILC superficially resembles IRC, although they are very different internally. The purpose of SILC is to provide secure conferencing services. Strong cryptographic methods are used to secure all traffic. The SILC is delivered as SILC Client for end users, SILC Server for system administrators, and SILC Toolkit for application developers.

EncFS
Added 2004-03-01
by Valient Gough
EncFS is an encrypted pass-through filesystem which runs in userspace on Linux (using the FUSE kernel module). Similarly to CFS and other pass-through filesystems, all data is encrypted and stored in the underlying filesystem. Unlike loopback filesystems, this does not have any predetermined filesystem size.

RC-Crypt
Added 2004-02-18
by Richard Jones
RC-Crypt can be used to encrypt or decrypt data using the RC5 algorithm. It operates on 128-bit data blocks, adding random characters for padding if necessary. The word size is 64 bits. It has many input/output options, making this a versatile piece of software suitable for embedding into scripts.

PwManager
Added 2004-02-16
by Michael Buesch
PwManager is a password manager. Passwords are protected using strong Blowfish encryption. It supports many features such as importing and exporting KPasman, GPasman, and plain-text files. The password-list can be encrypted with a master-password or with a key-card (a.k.a. chipcard or smartcard).

pwsafe
Added 2004-02-13
by N. Dade
pwsafe is a command line password database program for Unix. It is compatible with Counterpane's Win32 Password Safe software. It can also copy the passwords into the X selection and clipboard, but it doesn't open a visible window. The encrypted password database uses the same format as Password Safe 1.9.x. The database is encrypted with blowfish, and a single passphrase decrypts it all.

SEPPL
Added 2004-01-22
by Mezcalero
SEPPL is both a protocol definition and a software implementation of a new encryption layer for IPv4. It is extremely leightweight and easy to use. It is implemented for the Linux kernel and makes use of netfiler and the Linux CryptoAPI. It is intended as a software replacement for WEP but may be used on non-wireless lans as well. It even fits for VPN solutions.

CryptoFS
Added 2004-01-16
by Christoph Hohmann
CryptoFS is a encryption filesystem for the Linux Userland Filesystem. Files written to the mount point will be stored encrypted (data and filename) in a directory on a normal filesystem.

MyPasswordSafe
Added 2004-01-14
by Nolan
MyPasswordSafe is a straightforward, easy-to-use password manager that uses the Blowfish algorithm to store encrypt passwords. It uses the same file format as Password Safe.

JavaCA
Added 2004-01-12
by Jason Heiss
JavaCA is a text interface tool to run a X.509 (aka SSL) Certificate Authority that aims to be more user-friendly than OpenSSL. It also should run on non-UNIX operating systems where OpenSSL may not be available.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus