(Page 6 of 26)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >

Category: Cryptography » Data Encryption

JCE taglib for JSP
Added 2004-01-06
by hamgert
JCE taglib is a set of Open Source JSP tags, communicating with Sun's JCE (Java Cryptographic Extensions) library to bring strong encryption to your JSP applications.

Figaro's Password Manager
Added 2003-12-29
by John Conneely
Figaro's Password Manager (FPM) is a GNOME application that allows you to securely store your passwords, which are encrypted with the blowfish algorithm. It allows you to copy passwords or usernames to the clipboard or primary selection. If a password is for a Web site, FPM can keep track of the URLs of your login screens and can automatically launch your browser. You can also teach FPM to launch other applications. FPM can sort your passwords into categories. Finally, it has a password generator that can help you choose good passwords.

pam_passwdqc
Added 2003-11-03
by Solar Designer
pam_passwdqc is a simple password strength checking module for PAM-aware password changing programs, such as passwd(1). In addition to checking regular passwords, it offers support for passphrases and can provide randomly generated passwords. All features are optional and can be (re-)configured without rebuilding.

MixIt
Added 2003-10-30
by JoergGrohne
MixIt is a program which encrypts a given input file using a password and a level. Shifting and coding methods are used to make the input data unreadable. The strength of the encryption depends on the password, the level, and the length of the input data. A brute force code breaker, named breakit, is included for those who want to test the strength of MixIt. It includes features for unbreakable communication via email using one time pads and password books.

GPA (GNU Privacy Assistant)
Added 2003-10-23
by Bernhard Reiter
The GNU Privacy Assistant is a graphical frontend to GnuPG and may be used to manage the keys and encrypt/decrypt/sign/check files. It is much like Seahorse.

PinePGP
Added 2003-10-22
by Peter Hanecak, hanecak@megaloman.sk
PinePGP provides PGP and GnuPG filters for pine. PGP versions 2.6.x, 5.x, and 6.5.x are supported.

Gringotts
Added 2003-10-21
by Germano Rizzo
Gringotts is a small utility that allows you to jot down sensitive data (passwords, credit card numbers, PINs, etc.) in an easy-to-read, easy-to-access, and most of all very secure form. Gringotts makes use of the MCrypt and MHash libraries for encryption, and uses GTK+ 2 for the user interface. It lets the user choose from among eight strong encryption algorithms (RIJNDAEL-128, RIJNDAEL-256, SERPENT, TWOFISH, CAST-256, SAFER+, LOKI97, 3DES), two hashing algorithms (SHA1, RIPEMD 160) and two compression techniques (ZLib and BZip2) with four compression ratios. Moreover, it allows the user to use any file as a password, as an alternative to the usual text string, giving additional choices.

One Time Pad in Java
Added 2003-10-20
by El Capitán
One Time Pad in Java is a simple command line tool for secure encryption of files using random data. The receiver needs the same random data for decryption.

Steghide
Added 2003-10-15
by Stefan Hetzl
Steghide is steganography program which hides bits of a data file in some of the least significant bits of another file in such a way that the existence of the data file is not visible and cannot be proven. Steghide is designed to be portable and configurable and features hiding data in bmp, wav and au files, blowfish encryption, MD5 hashing of passphrases to blowfish keys, and pseudo-random distribution of hidden bits in the container data.

cryptoswap
Added 2003-08-29
by W. Michael Petullo
The cryptoswap package supports creating an encrypted swap partition when a system boots. This may be necessary on systems that use encrypted filesystems because plaintext secrets may be written to disk when memory is swapped to disk. The project also includes the ability to build a Linux initrd that supports booting with an encrypted root filesystem.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus