(Page 5 of 5)   < Prev  1 2 3 4 5 

Category: Cryptography » E-mail

Added 2001-10-22
by Logreport Foundation
Lire is a pluggable log analyzer. It has analyzers for over 25 log file formats, ranging from Apache WWW log files to iptables firewall logs and CUPS printing logs. Reports are generated in 9 different output formats, ranging from Excel 95 to PDF to HTML, optionally with included graphs.

VisualSoft SecureDev
Added 2001-10-22
by VisualSoft Technologies
VisualSoft SecureDev is a comprehensive suite of cryptographic and secure data communication components. The components in this suite include VisualSoft Crypt, VisualSoft CryptPlus, VisualSoft Mail, VisualSoft HTTP, VisualSoft XMLSecure, and VisualSoft FSecure. VisualSoft SecureDev suite can be used to provide total security for eBusiness applications.

Added 2001-10-22
by Phil Hunt
Herbrip is a command-line Python implementation of the Herbivore protocol, an initiative to encourage more people tor use encrypted email by making strong encryption almost totally effort-free for the user.

Added 2001-10-22
by Jeremy Bruestle and Blake Hegerle
AirSnort is a wireless LAN (WLAN) tool that recovers encryption keys. It operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered.

Added 2001-10-22
by Joshua Teitelbaum
CryptoMail is an end-to-end secure email system.

Smart Sign 0.1.2 (SmartShell)
Added 2001-10-22
by Tommaso
SmartSign is a set of modules which allow integration of smartcard technology into an OpenCA based Public Key Infrastructure in order to provide smartcard-based digital signature and local authentication security services. Currently only Cyberflex is supported. It allows direct signing of e-mail and e-news from within Netscape using smartcards and supports signing of generic files from command line. The package includes a PAM module too, which allows system administrators to integrate smartcard-based authentication for local users. Finally, a command line interactive shell supports all operations on the card, and can be used to automate some tasks on the card.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus