(Page 6 of 21)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >

Category: Authentication

yaSSL
Added 2004-05-10
by tao51
The yaSSL software package is a fast, dual-licensed implementation of SSL. It includes SSL client libraries and an SSL server implementation. It supports multiple APIs, including those defined by SSL and TLS. It also supports an OpenSSL compatibility interface.

NatACL
Added 2004-05-07
by Fabio Yasusi Yamamoto
NatACL is a authentication daemon for NAT and Transparent Proxy. The authentication input is done by the browser, it will redirect any URL to a internal page, asking for login and password. If the login and password are correct, it will create a NAT rule to forward the traffic, or redirect to the proxy port ( in case of transparent proxy ).

GNUnet
Added 2004-05-06
by Christian Grothoff
GNUnet is a peer-to-peer framework with focus on providing security. All link-to-link messages in the network are confidential and authenticated. The framework provides a transport abstraction layer and can currently encapsulate the peer-to-peer traffic in UDP, TCP, or SMTP messages. GNUnet supports accounting to provide contributing nodes with better service. The primary service build on top of the core GNUnet framework is anonymous file sharing.

Chwinpw
Added 2004-04-21
by
Chwinpw is a small command line utility that can securely change passwords on remote windows machines. It can help to enforce a higher degree of security, by periodic password maintenance of vital accounts. Chwinpw can be run from a logon script or from a central location. It is also possible to instruct chwinpw to make bulk changes.

minisip
Added 2004-04-05
by Johan Bilien
minisip is a SIP VoIP soft phone that implements additional security features such as mutual authentication, encryption and integrity of on-going calls, and encryption of the signaling (SIP over TLS). These security features use work-in-progress IETF standards (SRTP and MIKEY).

ZoneCD
Added 2004-03-26
by The Public IP ZoneCD has been created to help implement safe, free, wifi hotspots. NoCat dynamic fir
The Public IP ZoneCD has been created to help implement safe, free, wifi hotspots. NoCat dynamic firewall rules are used for user access and authentication. A transparent proxy sends all "Public" requests from NoCat through a content filter (Dansguardian) to block porn, hacker sites, extreme violence, illegal drugs, and other obscene and explicit Web sites. The content filter also blocks files extensions to protect your network from viruses, and restricts file sizes to save bandwidth.

Cyrus SASL
Added 2004-03-11
by Carnegie Mellon, cyrus-bugs@andrew.cmu.edu
The Cyrus SASL library is a generic library for easy integration of secure network authentication to any client or server application. It supports authentication via standard plaintext methods as well as CRAM-MD5 and DIGEST-MD5 shared secret methods and KERBEROS_V4 and GSSAPI Kerberos methods. The SASL protocol framework is used by SMTP, IMAP, ACAP, LDAP, and other standard protocols.

OpenCA
Added 2004-03-05
by Massimiliano Pala
The OpenCA Project is a collaborative effort to develop a robust, full-featured and Open Source out-of-the-box Certification Authority implementing the most used protocols with full-strength cryptography world-wide. OpenCA is based on many Open-Source Projects. Among the supported software is OpenLDAP, OpenSSL, Apache Project, Apache mod_ssl.

cosign
Added 2004-02-05
by UMich Web Team
cosign is a Web single sign on system that allows users to authenticate once per session and access any protected Web resources at the institution. If used, passwords are sent only to a single, central URL. Sessions have both idle and hard timeouts, and users can logout of all protected services by visiting a single URL. The use of public key cryptography ensures that a compromise of a protected Web server has no impact on the security of other participating servers.

Socks Server 5
Added 2004-01-28
by Matteo Ricchetti
Socks Server 5 is a socks server for the Linux platform which supports the Socks protocol versions 4 and 5.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus