(Page 5 of 12)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >

Category: Cryptography » Traffic Encryption

Enigma Mailer
Added 2002-05-17
by Fang
Enigmailer allows you to send enciphered email with an optional password hint. The recipient receives a mail message with a link to the script to facilitate deciphering. It comes in two versions, one for enciphering mail, the other also supporting multiple recipients, read receipts, attachments, and logging to allow the recipient to verify the credentials of the sender. Unlike other secure mail systems, it allows you to use your existing email address rather than forcing you to setup and use yet another one, and it does not require the recipient to have software installed on their machine (other than a browser).

Added 2002-05-15
by Neil Winton, zebedee@winton.org.uk
Zebedee is a simple program to establish an encrypted, compressed tunnel for TCP/IP or UDP data transfer between two systems. This allows traffic such as telnet, FTP, and X to be protected from snooping as well as potentially gaining performance over low-bandwidth networks from compression.

Secure Instant Messaging
Added 2002-05-07
by Sonny Rao
Secure Instant Messaging is a transparent encryption module for Gaim. It uses OpenSSL to encrypt/decrypt plaintext messages and base64 encoding to convert the encrypted messages to ASCII text.

DSCMD - DataSAFE Command Line Encryptor
Added 2002-04-26
by Regnoc Software
DSCMD allows you to encrypt source files for secure storage, transmission via the Internet, and e-mail attachments. Only someone who knows the eight-character locking combination can recover the contents of the encrypted file. DSCMD is completely command-line driven, and simple to integrate into your programs and scripts on both Windows NT and Linux servers.

Reliable SSH Tunnel
Added 2002-04-23
by Amram Bentolila
RSTunnel (Reliable SSH Tunnel) allows you to tunnel through data between two networks in a secure and encrypted tunnel. It uses SSH to connect the two machines. This will setup a tunnel for you, and make sure that it's constantly running.

Added 2002-04-15
by François-René Rideau
cotty is a simple command-line tool to manage pseudo-terminals. It allows users to run processes communicating with each other through their tty as opposed to files, pipes, or sockets. Its main use is to build a VPN (virtual private network) or conversely pierce a firewall.

Added 2002-04-04
by bighawk
Aesop is a TCP proxy which supports many advanced and powerful features. It's designed to be secure, fast, and reliable, and makes use of strong cryptography for all its data-transmission up to the end-link. Another powerful feature is that its proxies can be transparently stacked into a secure chain. It is implemented using multiplexing and hips with libaesop, a LD_PRELOAD wrapper around connect() that enables almost any application to be run over a defined chain of aesop proxies.

Added 2002-04-03
by cryptopup
The SLAN project is focused on developing a flexible open source Virutal Private Networking system, primarily for securing Internet uplinks which use broadcast media such as 802.11 wireless links or public/shared ethernets. The system is flexible enough to support traditional VPN applications as well. As well as featuring an open design and strong security, the SLAN project hopes to eventually provide support for all major computing platforms.

Added 2002-04-01
by IRG
What can you do with CHAOS? Easily encrypt files into your personal data archive. You can be confident that the data is safely secured. The additional special protection completely excludes an opportunity of selection of the password to the encrypted information at use of the generator of the passwords and keys.

SILC (Secure Internet Live Conferencing)(server)
Added 2002-04-01
by Pekka Riikonen
SILC (Secure Internet Live Conferencing) is a protocol which provides secure conferencing services in the Internet over insecure channels. SILC superficially resembles IRC, although they are very different internally. The purpose of SILC is to provide secure conferencing services. Strong cryptographic methods are used to secure all traffic.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus