(Page 12 of 54)   < Prev  7 8 9 10 11 12 13 14 15 16 17  Next >

Category: Cryptography

ElyCA
Added 2003-11-06
by PabloPableras
ElyCA is yet another implementation of a Certification Authority written in Python using MySQL as a database.

pam_passwdqc
Added 2003-11-03
by Solar Designer
pam_passwdqc is a simple password strength checking module for PAM-aware password changing programs, such as passwd(1). In addition to checking regular passwords, it offers support for passphrases and can provide randomly generated passwords. All features are optional and can be (re-)configured without rebuilding.

MixIt
Added 2003-10-30
by JoergGrohne
MixIt is a program which encrypts a given input file using a password and a level. Shifting and coding methods are used to make the input data unreadable. The strength of the encryption depends on the password, the level, and the length of the input data. A brute force code breaker, named breakit, is included for those who want to test the strength of MixIt. It includes features for unbreakable communication via email using one time pads and password books.

GPA (GNU Privacy Assistant)
Added 2003-10-23
by Bernhard Reiter
The GNU Privacy Assistant is a graphical frontend to GnuPG and may be used to manage the keys and encrypt/decrypt/sign/check files. It is much like Seahorse.

PinePGP
Added 2003-10-22
by Peter Hanecak, hanecak@megaloman.sk
PinePGP provides PGP and GnuPG filters for pine. PGP versions 2.6.x, 5.x, and 6.5.x are supported.

Pine/SSL
Added 2003-10-22
by Nick Sayer, nsayer@quack.kfu.com
Pine/SSL adds the ability for Pine to make SSL connections to IMAP, POP, SMTP, or NNTP servers.

Pine Privacy Guard
Added 2003-10-22
by Matt Pulver
Pine Privacy Guard is a small Perl script used to interface Pine and GnuPG for the secure exchange of email. It allows Pine users to conveniently encrypt, decrypt, clear-sign, and verify clear-signed email. Other features include the secure storage of secret key passphrases during a session, alias support, simple installation, and compact, well-documented code.

Cryptomak Cipher Tools
Added 2003-10-22
by M. Abdullah Khaidar
Cryptomak contains cipher and tools such as substitution, Vigenere, Affine, transposition and index of coincidence.

Gringotts
Added 2003-10-21
by Germano Rizzo
Gringotts is a small utility that allows you to jot down sensitive data (passwords, credit card numbers, PINs, etc.) in an easy-to-read, easy-to-access, and most of all very secure form. Gringotts makes use of the MCrypt and MHash libraries for encryption, and uses GTK+ 2 for the user interface. It lets the user choose from among eight strong encryption algorithms (RIJNDAEL-128, RIJNDAEL-256, SERPENT, TWOFISH, CAST-256, SAFER+, LOKI97, 3DES), two hashing algorithms (SHA1, RIPEMD 160) and two compression techniques (ZLib and BZip2) with four compression ratios. Moreover, it allows the user to use any file as a password, as an alternative to the usual text string, giving additional choices.

One Time Pad in Java
Added 2003-10-20
by El Capitán
One Time Pad in Java is a simple command line tool for secure encryption of files using random data. The receiver needs the same random data for decryption.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus