(Page 8 of 12)   < Prev  2 3 4 5 6 7 8 9 10 11 12  Next >

Category: Cryptography » Traffic Encryption

Added 2001-10-22
by Magnus Lundstr÷m, logic@nocrew.org
vpnstarter is a C replacement for the ssh-ppp perl script. It offers keep-alive and re-initiate capabilities, and a wide range of user-tweakable settings.

Added 2001-10-22
by Maxim Krasnyansky, max_mk@yahoo.com
VTun is the easiest way to create Virtual Tunnels over TCP/IP networks with traffic shaping, compression, and encryption. It is a user space implementation and doesn't need modification of any kernel parts. VTun supports IP, PPP, SLIP, Ethernet, and other tunnel types. VTun is easily and highly configurable; it can be used for various network tasks like VPN, Mobil IP, Shaped Internet access, Ethernet tunnel, IP address saving, etc.

T.U.T 1.1
Added 2001-10-22
by Vincent Amoroso, vja2@cornell.edu
T.U.T. is a simple UDP and TCP tunneler which can be run in client and server modes, and supports RC4 Encryption with keys up to 4096 bits. In client mode, T.U.T. listens for UDP and connects on TCP, in server mode it listens for TCP and connects on UDP. T.U.T. can Tunnel either UDP on TCP or TCP on UDP. This combination is ideal for by-passing UDP blocked firewalls if you want to run Quake or ICQ, and have an accessible server outside of the firewall.

Added 2001-10-22
by Pete Chown, pc@skygate.co.uk
SafeGossip provides TLS support for the FTP, IMAP, POP, SMTP and telnet protocols. Both the old and new forms of the protocols are supported. In the old form a different port number is used for encrypted communications, while in the new form the port is shared with the unencrypted version of the protocol. SafeGossip is a proxy server that edits the protocol stream sent out by your usual clients and servers. You do not have to use a particular implementation of any protocol in order to use SafeGossip.

Added 2001-10-22
by Mats Andersson, mindterm@mindbright.se
MindTerm is a complete ssh-client in pure Java. It can be used either as a standalone Java application or as a Java applet. Three packages of importance are provided (terminal, ssh, and security). The terminal package is a rather complete vt102/xterm-terminal, and the ssh-package contains the ssh- protocol and also "drop-in" socket replacements to use ssh-tunnels transparently from a Java application/applet. It also contains functionality to realize a ssh-server. Finally, the security package contains RSA, DES, 3DES, Blowfish, IDEA, and RC4 ciphers.

Added 2001-10-22
by Lennart Poettering, poettering@gmx.net
TapTunnel is a client and server for creating Ethernet tunnels over TCP/IP-networks (such as the Internet). It can be used to connect two private networks over a public one. It uses raw-ethernet, and therefore can tunnel a variety of protocols (IPX, ARP, IPv4, IPv6, DHCP, etc).

Added 2001-10-22
by Nadeem Riaz, nads@bleh.org
Psftp is basically an ftp-like program that uses ssh 1.x as its backend. Psftp provides a cli ftp-like interface on top of scp and ssh.

FreeS/WAN for Linux
Added 2001-10-22
by The Linux FreeS/WAN Project Team
Linux FreeS/WAN provides IPSEC (IP Security, which is both encryption and authentication) kernel extensions and an IKE (Internet Key Exchange, keying and encrypted routing daemon) as well as various rc scripts and documentation. It is known to interoperate with other IPSEC and IKE system already deployed by other vendors such as OpenBSD.

Added 2001-10-22
by Gomez Henri
Jonama is a network relay, that utilizes SSL to authenticate and encrypt connections between two points. It uses SSL v2/v3/TLS from SSLeay or OpenSSL. In addition, it contains a CA mode to allow it perform access control based on certificates.

Added 2001-10-22
by CÚdric Gourio
This applet implements the Ssh Protocol 1.5. The Terminal Emulation is almost VT100 compliant. It provides secure communications over insecure networks. All communications are automatically and transparently encrypted. Encryption is also used to protect integrity. You can download and use this program for free.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus