(Page 10 of 12)   < Prev  2 3 4 5 6 7 8 9 10 11 12  Next >

Category: Cryptography » Traffic Encryption

Added 2001-10-22
by Sam Lantinga
This is a peer-to-peer IP tunnel program that runs a PPP connection over an arbitrary TCP port. It gives you the flexibility of the PPP daemon combined with the flexibility of optional encryption and host-based authentication. The encryption requires the RSA and DES libraries, which are not a part of the PPPTCP package.

Added 2001-10-22
LinuxCare's Strong Crypto division is proud to release VPS 2.0 Beta 2. VPS, the Virtual Private Server, is a linux-based VPN solution for connecting disparate networks securely over the internet. Using this software, you can connect multiple networks to each other without having to pay for expensive leased lines or dedicated connections. All you need is an internet connection for each site!

Added 2001-10-22
by Darren Reed
Slush is a project to create a simple and secure remote shell application using SSL/TLS for communication security and X509 for authentication. Slush is based on the excellent stunnel program. The ultimate goal of Slush is to create a free and superior replacement for SSH using open protocols and source code. Slush uses the SSLeay or OpenSSL libraries for the TLS and X509 components. Slush itself is released under a GPL license.

Tunnel Vision
Added 2001-10-22
by Worldvisions
Tunnel Vision creates an encrypted Virtual Private Network, or VPN, between two Tunnel Vision-capable sites on the Internet. Realistically, that means sites with a Linux server running Tunnel Vision or with a Worldvisions Weaver acting as their Internet gateway. Tunnel Vision requires a Linux 2.2.x kernel in order to run. Worldvisions Tunnel Vision provides the Virtual Private Network (VPN) support in the Worldvisions Weaver. It is released for free under the terms of the GNU Library General Public License, or LGPL.

Added 2001-10-22
by Robert Muchsel
ENskip is a security module for the TCP/IP stack. It provides encryption and authentication of packets on the IP layer between two or more machines. ENskip is compatible to other SKIP implementations, e.g. Sun SKIP for Solaris. However, unlike other SKIP implementations available on the Internet, ENskip contains strong encryption algorithms.

MIT Kerberos for Macintosh
Added 2001-10-22
by MIT
MIT Kerberos for Macintosh is a Kerberos authentication system for Mac OS. It provides Kerberos v4 and Kerberos v5 protocols, GSSAPI, a graphical Login interface and accompanying API for acquiring Kerberos tickets, an in-memory ticket cache and KClient compatibility. The current release of MIT Kerberos for Macintosh is version 3.5.

Freenet Key Manager
Added 2001-10-22
by Timm Murray
Keyman is a key manager for storing Freenet SVK keys; it keeps all SVK private keys in a encrypted form. This could even work with any type of public/private key encryption (although it focuses on Freenet) and can hopefuly be extended so it can use any future Freenet public/private key types.

Added 2001-10-22
by Christer Weinigel and Richard Levitte
FISH is a SSH client for VMS.

Added 2001-10-22
by Simon Tatham, anakin@pobox.com
A windows command line version of scp (Secure Copy). Very similar to the familiar unix scp.

The Java SSH/Telnet Application/Applet
Added 2001-10-22
by Matthias L. Jugel, leo@mud.de
The Java(tm) Telnet Applet is a fully featured telnet/SSH program that allows users to connect and login to remote hosts via the Internet or an Intranet using only their WWW Browser. It includes not only telnet-compliant connection services, but also the ability to dynamically load additional Terminal Emulations and plugins. The available plugins are: Socket, Telnet, Terminal, Script, and SSH.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus