(Page 9 of 26)   < Prev  4 5 6 7 8 9 10 11 12 13 14  Next >

Category: Cryptography » Data Encryption

PassGuard gpasman plugin
Added 2003-02-24
by RUAUDEL Frédéric
The PassGuard suite is a set of software that manages your passwords encrypted in a file. You just have to remember one, and different encrypted file formats are supported via plugins. The PassGuard gpasman plugin is the plugin that manages gpasman files encrypted with the RC2 algorithm.

Added 2003-02-20
by plexobject
PlexCrypt protects documents and folders via PKI-based encryption using secured algorithms such as AES, Blowfish, CAST, DES, ElGamal, IDEA, IES, RC4, RC6, RSA, Rijndael, Serpent Skipjack, Twofish, etc. It allows users to encrypt multiple files and folders automatically. PlexCrypt allows users to digital sign documents and folders and use that signature to verify that original document has not been maliciously or accidently altered. It supports MD5WithRSAEncryption, SHA1WithRSA/ISO9796-2, MD2WithRSAEncryption, RIPEMD160WithRSAEncryption, SHA1WithRSAEncryption, RIPEMD160WithRSAEncryption, MD5WithRSA/ISO9796-2, RIPEMD160WithRSA/ISO9796-2, RIPEMD160WithRSA/ISO9796-2 algorithms for digital signatures. PlexCrypt also allows users to archive a set of files and folders in the ZIP format and extract them later. In addition, it allows users to create and manage digital certificates and key-pairs for encryption and digital signatures.

RSA implementation in Octave
Added 2003-01-06
by xilun
RSA implementation in Octave is a short, dirty, and very slow implementation of the cryptographic primitives of the RSA public key algorithm, using GNU Octave. It includes functions to work on big numbers, modular exponentiation, modular inversion, probabilistic prime numbers generators, key pair generators, and functions to encrypt and decrypt files using a rather insecure scheme.

Added 2002-12-04
by Arne Vidstrom
CECrypt is a file encryption tool for Windows CE, that can encrypt with either 3-DES or IDEA.

guard bash
Added 2002-11-20
by Alboaie Sînicã
guard bash is a shell wrapper that will execute an authentication phase before any command is executed. It uses a secret (user owned) algorithm method, and has a per user customizable procedure. If you need to connect to your computer from outside of your safe environment, even if you use SSH, you are vulnerable to simple attacks like key sniffing or to more complex attacks against SSH. If you have more than just one authentication method, you can more safely log in your account from an insecure Internet host.

Added 2002-11-19
by anthonyu
mod_authenticache provides a simple and generic method for caching authentication information on the client side in order to enhance performance. It has been tested with several Basic HTTP authentication modules, and has an Apache 2.0.x optional function exporter for caching credentials from any custom authentication module.

Image Sign
Added 2002-11-12
by Andrew Wood
imagesign is a utility to digitally sign images and store the signature within them in a comment block. This allows the images to be viewed as normal but their integrity can easily be verified with no extra information.

Added 2002-10-30
by Andy Leifer
E-pad is a portable, commandline-driven encryption program. It is based upon the symmetric-key cryptosystem known as the one-time pad. It will encrypt or decrypt any file with any key regardless of filetype. It is designed with usability in mind, but it is also well-suited to work in batch files or shell scripts.

Added 2002-09-17
by johnny
bcrypt is a blowfish file encryption utility which aims for cross-platform portability. In addition to providing 448-bit encryption, bcrypt overwrites input files with random garbage before deletion in order to make low-level data recovery much more difficult.

Added 2002-09-10
by Folkert van Heusden
video-entropyd is a program to add entropy data from video4linux devices to the kernel random driver.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus