(Page 9 of 12)   < Prev  2 3 4 5 6 7 8 9 10 11 12  Next >

Category: Cryptography » Traffic Encryption

NiftyTelnet SSH
Added 2001-10-22
by jonasw@lysator.liu.se
NiftyTelnet 1.1 SSH r3 is an enhanced version of Chris Newman's NiftyTelnet 1.1 application which adds support for encrypted terminal sessions using the SSH (Secure Shell) protocol. Please read the included Readme file before distributing this version Release 3 (r3) adds Scp (Secure Copy), RSA authentication, printing and a number of other new features along with the usual bug fixes.

Added 2001-10-22
by Andersson, Mats
MindTunnel is an entirely FREE SSH (currently v1.5) server program written in pure Java. It was implemented for fun (or for completeness of the mindbright ssh-package :-) and is not intended to be a replacement for "the real thing". However, it can be used as a minimal sshd, supporting only tunneling (i.e. port-forwarding). It has RSA-authentication as the only means of authentication, the 'authorized_keys' file has changed to be handled in a central place for all users (hence you don't need to give the users shell-accounts on the server-machine).

Added 2001-10-22
by anakin@pobox.com
PuTTY (originally STel until it stopped being just Telnet) is a free implementation of Telnet and SSH for Win32 platforms (Win95 and WinNT have been tested; Win98 is reported to work fine).

Secure Shuttle Transport
Added 2001-10-22
by Boomerang Online
SST uses a state of the art interface to set up your communications quickly and easily. To insure communication security, SST uses automatic RSA encryption to secure information before sending it over the Internet. Once a recipient receives a communication, SST automatically decrypts the information so that it can be read. The RSA encryption/decryption technique that SST uses is both state-of-the-art and highly respected. SST lets you: Open specific communication windows. Use these windows to send a message, initiate chat (or a file transfer), or send an email. Communicate online real-time. As you type and send your instant message over Chat, your counterpart can respond immediately. Open as many windows as you want so you can communicate with several people at once. Selectively decide who you want to receive communications from, by blocking communications from those you don't want to hear from. Send encrypted files and messages that are encrypted when sent and decrypted when received. Select a "Skin Style" that cutomizes how you want SST to display on your PC; Skin Style are user-interface "styles" that you change the presentation of SST program windows. SST provides state of the art access and security: By enabling others to "page" you online. By preventing others from reading (or even seeing) the contents of your files as they are transferred over the Internet. Additionally, SST: Automatically checks for incoming email while you work and notifies you of when email has been received. Launches your preferred email program and lets you read your email as soon as it is received.

Top Gun SSH
Added 2001-10-22
by Ian Golberg
This is a version of the ssh secure shell application for the Pilot. It also uses the built-in TCP/IP stack. It is based on Top Gun Telnet.

Added 2001-10-22
by Robert O'Callahan
TTSSH is a free SSH client for Windows. It is implemented as an extension DLL for Teraterm Pro. Teraterm Pro is a superb free terminal emulator/telnet client for Windows, and its source is available. TTSSH adds SSH capabilities to Teraterm Pro without sacrificing any of Teraterm's existing functionality. TTSSH is also free to download and use and its source is available too, with an open source license. Furthermore, TTSSH has been developed entirely in Australia, and can be exported from here to anywhere in the world.

Added 2001-10-22

Kerberos: The Network Authentication Protocol
Added 2001-10-22
by Massachusetts Institute of Technology
Kerberos is a network authentication protocol. It is designed to provide strong authentication for client/server applications by using secret-key cryptography. A free implementation of this protocol is available from the Massachusetts Institute of Technology. Kerberos is available in many commercial products as well. The Internet is an insecure place. Many of the protocols used in the Internet do not provide any security. Tools to "sniff" passwords off of the network are in common use by systems crackers. Thus, applications which send an unencrypted a password over the network are extremely vulnerable. Worse yet, other client/server applications rely on the client program to be "honest" about the identity of the user who is using it. Other applications rely on the client to restrict its activities to those which it is allowed to do, with no other enforcement by the server.

CIPE - Crypto IP Encapsulation
Added 2001-10-22
by Olaf Titz
CIPE (Crypto IP Encapsulation) is an ongoing project to build encrypting IP routers. The protocol used is as lightweight as possible. It is designed for passing encrypted packets between prearranged routers in the form of UDP packets. This is not as flexible as IPSEC but it is enough for the original intended purpose: securely connecting subnets over an insecure transit network.

MIT PGP Freeware
Added 2001-10-22
by MIT
PGP or Pretty Good Privacy® is a powerful cryptographic software suite that enables people to securely exchange messages, and to secure files, disk volumes and network connections with both privacy and strong authentication. To download it, you need to fill out the MIT form. Click on the link underneath 'by MIT' above for more information. NEW FEATURES IN 6.5.1 PGPnet. PGPnet is a landmark product in the history of PGP. PGPnet secures all TCP/IP communications between itself and any other machine running PGPnet. PGPnet has been successfully tested with Cisco routers(requires Cisco IOS 12.0(4) or later with IPSec TripleDES), Linux FreeS/WAN, and many others. Self-Decrypting Archives. You may now encrypt files or folders into Self-Decrypting Archives (SDA) which can be used by users who do not even have PGP. The archives are completely independent of any application, compressed and protected by PGP's strong cryptography. Integrated PGP Command Line. This version incorporates the popular command line version of PGP for Windows platforms. This product provides you a convenient way to integrate PGP with other Windows applications and automated processes on your desktop system. Please note that this is intended for single user/workstation use. For use on servers, customers are required to purchase the PGP Command Line/Batch Server product. Please contact your local Network Associates Sales representative for more information. Automated Freespace Wiping. PGP's Freespace Wipe feature now allows you to use the Windows Task Scheduler to schedule periodic secure wiping of the freespace on your disk. Hotkeys. The Use Current Window feature has been significantly enhanced by the addition of Hotkeys. By pressing the configured key combination, the Encrypt/Decrypt/Sign functions can be automatically invoked in zero clicks without using PGPtray. Fingerprint Word List. When verifying a PGP public key fingerprint, you can now choose to view the fingerprint as a word list instead of hexadecimal characters. The word list in the fingerprint text box is made up of special authentication words that PGP uses and are carefully selected to be phonetically distinct and easy to understand without phonetic ambiguity. Support for Outlook 2000 and Outlook Express 5.0. This version of PGP adds support for sending and receiving encrypted e-mail in Microsoft Outlook 2000 and Outlook Express 5.0. HTTP Proxy Support. If you are behind a corporate firewall with an HTTP proxy server, PGP now supports accessing HTTP keyservers through the proxy. To use this feature, you must configure the proxy server address in your Internet Explorer preferences. Smart Word Wrapping. The word wrapping in PGP now automatically rewraps paragraphs and even quoted paragraphs resulting in much cleaner signed messages.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus