< Prev 1 2 3 4 5 6 7 8 9 10 11 Next >
Category: Cryptography » Traffic Encryption
Enigmailer allows you to send enciphered email with an optional password hint. The recipient receives a mail message with a link to the script to facilitate deciphering. It comes in two versions, one for enciphering mail, the other also supporting multiple recipients, read receipts, attachments, and logging to allow the recipient to verify the credentials of the sender. Unlike other secure mail systems, it allows you to use your existing email address rather than forcing you to setup and use yet another one, and it does not require the recipient to have software installed on their machine (other than a browser).
Zebedee is a simple program to establish an encrypted, compressed tunnel for TCP/IP or UDP data transfer between two systems. This allows traffic such as telnet, FTP, and X to be protected from snooping as well as potentially gaining performance over low-bandwidth networks from compression.
Secure Instant Messaging
Secure Instant Messaging is a transparent encryption module for Gaim. It uses OpenSSL to encrypt/decrypt plaintext messages and base64 encoding to convert the encrypted messages to ASCII text.
DSCMD - DataSAFE Command Line Encryptor
DSCMD allows you to encrypt source files for secure storage, transmission via the Internet, and e-mail attachments. Only someone who knows the eight-character locking combination can recover the contents of the encrypted file. DSCMD is completely command-line driven, and simple to integrate into your programs and scripts on both Windows NT and Linux servers.
Reliable SSH Tunnel
RSTunnel (Reliable SSH Tunnel) allows you to tunnel through data between two networks in a secure and encrypted tunnel. It uses SSH to connect the two machines. This will setup a tunnel for you, and make sure that it's constantly running.
cotty is a simple command-line tool to manage pseudo-terminals. It allows users to run processes communicating with each other through their tty as opposed to files, pipes, or sockets. Its main use is to build a VPN (virtual private network) or conversely pierce a firewall.
Aesop is a TCP proxy which supports many advanced and powerful features. It's designed to be secure, fast, and reliable, and makes use of strong cryptography for all its data-transmission up to the end-link. Another powerful feature is that its proxies can be transparently stacked into a secure chain. It is implemented using multiplexing and hips with libaesop, a LD_PRELOAD wrapper around connect() that enables almost any application to be run over a defined chain of aesop proxies.
The SLAN project is focused on developing a flexible open source Virutal Private Networking system, primarily for securing Internet uplinks which use broadcast media such as 802.11 wireless links or public/shared ethernets. The system is flexible enough to support traditional VPN applications as well. As well as featuring an open design and strong security, the SLAN project hopes to eventually provide support for all major computing platforms.
What can you do with CHAOS? Easily encrypt files into your personal data archive. You can be confident that the data is safely secured. The additional special protection completely excludes an opportunity of selection of the password to the encrypted information at use of the generator of the passwords and keys.
SILC (Secure Internet Live Conferencing)(server)
SILC (Secure Internet Live Conferencing) is a protocol which provides secure conferencing services in the Internet over insecure channels. SILC superficially resembles IRC, although they are very different internally. The purpose of SILC is to provide secure conferencing services. Strong cryptographic methods are used to secure all traffic.
Browse by category