(Page 8 of 54)   < Prev  3 4 5 6 7 8 9 10 11 12 13  Next >

Category: Cryptography

minisip
Added 2004-04-05
by Johan Bilien
minisip is a SIP VoIP soft phone that implements additional security features such as mutual authentication, encryption and integrity of on-going calls, and encryption of the signaling (SIP over TLS). These security features use work-in-progress IETF standards (SRTP and MIKEY).

Cryptonit
Added 2004-03-22
by IDEALX
Cryptonit is a client side cryptographic tool which allows you to encrypt/decrypt and sign/verify files with PKI (Public Key Infrastructure) certificates.

ePointPGP
Added 2004-03-08
by Daniel Nagy
ePointPGP provides limited OpenPGP functionality for Java applications and applets, using the available crypto providers rather than implementing its own. It is extremely lightweight, and functionality that is not required can be safely left out.

Botan
Added 2004-03-08
by Jack Lloyd
Botan is a library of cryptographic algorithms written in C++. It includes a wide selection of block and stream ciphers, public key algorithms, hash functions, and message authentication codes. It has an easy-to-use filter interface and supports many common industry standards, including X.509v3.

The SSH library
Added 2004-03-05
by Aris Adamantiadis
The SSH library is a C library to authenticate in a simple manner to one or more SSH servers. The goal of this project is to provide a library much simpler to use than OpenSSH's one. A sample SSH client is provided.

SILC (Secure Internet Live Conferencing)(Toolkit)
Added 2004-03-02
by Priikone
SILC (Secure Internet Live Conferencing) is a protocol which provides secure conferencing services in the Internet over insecure channels. SILC superficially resembles IRC, although they are very different internally. The purpose of SILC is to provide secure conferencing services. Strong cryptographic methods are used to secure all traffic. The SILC is delivered as SILC Client for end users, SILC Server for system administrators, and SILC Toolkit for application developers.

EncFS
Added 2004-03-01
by Valient Gough
EncFS is an encrypted pass-through filesystem which runs in userspace on Linux (using the FUSE kernel module). Similarly to CFS and other pass-through filesystems, all data is encrypted and stored in the underlying filesystem. Unlike loopback filesystems, this does not have any predetermined filesystem size.

suPHP
Added 2004-02-25
by Sebastian Marsching
suPHP is a combination of an Apache module (mod_suphp) and an executable which provides a wrapper for PHP. With both together, it is possible to execute PHP scripts with the permissions of their owner without having to place a PHP binary in each user's cgi-bin directory. suPHP doesn't need Apache's suExec, and provides a logging function.

RC-Crypt
Added 2004-02-18
by Richard Jones
RC-Crypt can be used to encrypt or decrypt data using the RC5 algorithm. It operates on 128-bit data blocks, adding random characters for padding if necessary. The word size is 64 bits. It has many input/output options, making this a versatile piece of software suitable for embedding into scripts.

Stunnel
Added 2004-02-16
by Michal Trojnara,
The stunnel program is designed to work as an SSL encryption wrapper between remote client and local (inetd-startable) or remote server. It can be used to add SSL functionality to commonly used inetd daemons like POP2, POP3, and IMAP servers without any changes in the programs' code. It will negotiate an SSL connection using the OpenSSL or SSLeay libraries. It calls the underlying crypto libraries, so stunnel supports whatever cryptographic algorithms you compiled into your crypto package.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus