(Page 14 of 54)   < Prev  9 10 11 12 13 14 15 16 17 18 19  Next >

Category: Cryptography

ccrypt
Added 2003-08-27
by Peter Selinger
ccrypt is a commandline utility for encrypting and decrypting files and streams. It was designed as a replacement for the standard Unix crypt utility, which is notorious for using a very weak encryption algorithm. ccrypt is based on the Rijndael cipher, which is the U.S. government's chosen candidate for the Advanced Encryption Standard (AES). This cipher is believed to provide very strong security. A compatibility mode is included for decrypting legacy "unix crypt" files.

The GNU Privacy Guard
Added 2003-08-26
by Werner Koch
GnuPG (the GNU Privacy Guard) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

Amrita VPN
Added 2003-08-19
by Jayaraj
Amrita VPN is an easy-to-use open source VPN solution that runs on the GNU/Linux platform. The implementation is fully in userspace and requires no kernel patches or enhancements. It uses SSL for strong encryption and authentication.

PHPki
Added 2003-08-19
by E. Roadcap
PHPki is an Open Source Web application for managing a Public Key Infrastructure within a small organization. It provides a mechanism for the centralized creation and management of digital certificates for use with S/MIME-enabled email cilents. It will not create server, browser, or code signing certificates.

beecrypt
Added 2003-08-18
by Bob Deblier, bob.deblier@pandora.be
BeeCrypt is an ongoing project to provide strong and fast cryptography in the form of a toolkit usable by commercial and open source projects. Included in the library are entropy sources, random generators, block ciphers, hash functions, message authentication codes, multiprecision integer routines, and public key primitives.

FirePay
Added 2003-08-11
by flamingcow
FirePay is an implementation of the HashCash/MIME (application/postage-hashcash) specification. HashCash is an anti-spam, anti-DoS system for email. The concept centers around the sender of the mail completing a computationally expensive task (in this case, generating hash collisions) that the recipient can verify very quickly. This allows the sender to "pay" for transport in CPU cycles, creating artificial scarcity. Programs are included to add payment to messages (for the sender) and to verify message payment (for the recipient).

T/bone SecureMail Gateway
Added 2003-08-08
by bone labs
T/bone SecureMail Gateway provides digital signatures and encryption for the entire email traffic of a company with a single organizational certificate. It is a server-based solution which works transparently for end users. T/bone automatically finds the certificates of external users or companies via the Internet. Secure email traffic to customers, suppliers, and partners is easily established, no matter whether or not they also deploy T/bone. Packages for Red Hat, SuSE, and Debian GNU/Linux are available for download.

Kismet
Added 2003-08-08
by Mike Kershaw
Kismet is an 802.11b network sniffer and network dissector. It is capable of sniffing using most wireless cards, automatic network IP block detection via UDP, ARP, and DHCP packets, Cisco equipment lists via Cisco Discovery Protocol, weak cryptographic packet logging, and Ethereal and tcpdump compatible packet dump files. It also includes the ability to plot detected networks and estimated network ranges on downloaded maps or user supplied image files.

Lazy Encryption Algorithm
Added 2003-08-06
by Eduardo Ruiz
LEA is a simple algorithm for file encryption that uses boolean algebra and modular arithmetic to test the stream and generate numbers with a logical order. Using bytes as increments and decrements users can choose between normal encryption without a pseudo- random data generator or steganography with or without random data.

OpenVPN
Added 2003-08-06
by James Yonan
OpenVPN is a robust and highly configurable VPN (Virtual Private Network) daemon which can be used to securely link two or more private networks using an encrypted tunnel over the Internet. OpenVPN's principal strengths include wide cross-platform portability, excellent stability, support for dynamic IP addresses and NAT, adaptive link compression, single TCP/UDP port usage, a modular design that offloads most crypto tasks to the OpenSSL library, and relatively easy installation that in most cases doesn't require a special kernel module.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus