(Page 7 of 12)   < Prev  2 3 4 5 6 7 8 9 10 11 12  Next >

Category: Cryptography » Traffic Encryption

Card Terminal Driver Library
Added 2001-11-21
by Nolan
Card Terminal Driver Library aims to add support for smart card and magnetic stripe card terminals, such as the IBM 4779, to Linux, and other Posix compatible systems.

Added 2001-11-16
by damien
gpgsig can retrieve a key from the server, sign the key, send the signed key to the server, mail the signed key to its owner, or update your keys.

Added 2001-10-31
by Calle Laakkonen, calle.laakkonen@saunalahti.fi
Gnome SSH is a clone of kssh, the ssh frontend for kde. It keeps track of the sites you access with username and port information.

Added 2001-10-24
by Ralf S. Engelschall, rse@engelschall.com
mod_ssl provides provides strong cryptography for the Apache 1.3 webserver via the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1). It is based on the SSL/TLS toolkit OpenSSL and supports all SSL/TLS related functionality, including RSA and DSA/DH cipher support, X.509 CRL checking, etc. Additionally it provides special Apache related facilities like DBM and shared memory based inter-process SSL session caching. per-URL SSL session renegotiations, DSO support, etc.

Added 2001-10-22
by Jeremy Beker, jbeker@3gi.com
(Update) Sendmail-TLS is a wrapper for sendmail (and possibly other MTAs) that allows mail clients which support SSL and TLS connections to communicate with a mail server securely. This currently includes Netscape Messenger, Microsoft Outlook, and Microsoft Outlook Express. This is being released under the GNU Public License.

Added 2001-10-22
by Gomez Henri, nri@mail.dotcom.fr
Jonama is a network relay, that utilizes SSL to authenticate and encrypt connections between two points. It uses SSL v2/v3/TLS from SSLeay or OpenSSL. In addition, it contains a CA mode to allow it perform access control based on certificates.

Added 2001-10-22
by Joachim Dathe, strenc@sdf.lonestar.org
STRENC is a WIN32 console application with filter functionality, for encryption of data streams. The well known filter concept uses standard input-output-devices with the ability to redirect data from/to files and/or other applications (using control characters <, >, | ) STRENC takes input data stream byte by byte, outputting the corresponding encrypted byte value immediately. That way it is well-suited for use with other data stream oriented applications. Command line formats for encryption and decryption are absolutely identical (symmetric operation).

Added 2001-10-22
by INTELICOM, Security software company
INTELICOM TUNNEL HIGH SECURITY VPN FOR AFORDABLE PRIZE The Intelicom Tunnel enabled you to transfer sensible data over public networks, like Internet, in a secure manner. Intelicom Tunnel uses strong encryption protocols and standard certificates for encryption and authentication. In addition all data is also compressed and in this way the throughput of the connection is boosted by factor of 4 for most text oriented protocols. Intelicom Tunnel product is a 32-bit Windows NT application which runs like a service application on the server side of the VPN (virtual private network) and like a normal Win32 application on the client side of the tunnel. In this way the solution is very easy to install and support.

Added 2001-10-22
by Andreas Steinmetz, vpnd@sunsite.auc.dk
The virtual private network daemon vpnd is a daemon which connects two networks on network level either via TCP/IP or a (virtual) leased line attached to a serial interface. All data transfered between the two networks are encrypted using the unpatented free Blowfish encryption algorithm. vpnd is not intended as a replacement of existing secured communications software like ssh or tunneling facilities of the operating system. It is, however, intended as a means of securing transparent network interconnection across potentially insecure channels.

Added 2001-10-22
by Vasim V., vasim@geocities.com
jlip is a SLIP-driver with additional features like one logical link over many physical lines (multiline), IP-over-TCP tunnelling with public key hosts authorization (elliptic curves) and data encryption (blowfish with 112-448 bits key) for VPNs (Virtual Private Networks). It currently works under FreeBSD only and there are no english docs. A russian to english translation is welcome.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus