RSS 105 projects tagged "BSD Original"

Download Website Updated 18 May 2001 AES Encryption for Shell Scripts

Screenshot
Pop 142.62
Vit 1.76

AES Encryption for Shell Scripts provides strong encryption/decryption using the Advanced Encryption Standard algorithm "Rijndael" to do 128-bit encryption. It is intended for use in shell scripts or as part of a larger cryptosystem, not as a standalone program.

Download Website Updated 24 Jan 2002 AES for Ruby

Screenshot
Pop 29.14
Vit 1.42

The AES for Ruby module provides compact and fast AES encryption for Ruby programs, without the overhead of linking to large third-party encryption libraries.

Download Website Updated 30 Jan 2001 AVAcl

Screenshot
Pop 28.88
Vit 1.00

AVAcl is intended to be called from within AV scanning scripts such as Inflex and AMaViS, to provide an ACL type facility such that adminitrators can provide finer control over their file type/name/content/email blocking.

Download Website Updated 01 Sep 2003 Automated Password Generator

Screenshot
Pop 310.36
Vit 5.43

Automated Password Generator is a set of tools for random password generation including a standalone password generator, an RFC972 password generation server, and a Perl client for the password generation server. These feature a built-in X9.17 random number generator, and 35 modes of password generation, including pronounceable password generation.

Download Website Updated 29 Sep 2003 Bait and Switch Honeypot System

Screenshot
Pop 47.35
Vit 1.45

The Bait and Switch Honeypot System combines the snort Intrusion Detection System (IDS) with honeypot technology to create a system that reacts to hostile intrusion attempts by marking and then redirecting all "bad" traffic to a honeypot that partially mirrors your production system. Once switched, the would-be hacker is unknowingly attacking your honeypot instead of the real data, while your clients and/or users are still safely accessing the real system. Life goes on, your data is safe, and you get to learn about the bad guy as an added benefit. It works with Snort 1.9.0, 1.9.1, and 2.0.2.

Download Website Updated 20 Aug 2006 BruteBlock

Screenshot
Pop 41.57
Vit 1.41

Bruteblock allows system administrators to block various bruteforce attacks on UNIX services. The program analyzes system logs and adds attackers' IP addresses into the ipfw2 table, effectively blocking them. Addresses are automatically removed from the table after specified amount of time. Bruteblock uses regular expressions to parse logs, which gives it enough flexibility to be used with almost any network service. Bruteblock doesn't use any external programs and works with ipfw2 tables via the raw sockets API.

Download Website Updated 13 Dec 2001 CDSA 2

Screenshot
Pop 40.25
Vit 1.49

CDSA stands for Common Data Security Architecture. It provides a security framework that includes cryptographically signed modules to present an abstracted unified API to the application developer to perform cryptographic and security related operations. It also includes hardware support for cryptographic tokens and biometric devices, such as thumbprint scanners. Intel has implemented the CDSA 2 specification and released it as open source.

No download Website Updated 02 Jun 2007 CODEX

Screenshot
Pop 34.18
Vit 1.98

CODEX (the Cornell Data Exchange) is a key distribution system. It is designed for applications with a moderate number of clients (tens or hundreds) requesting keys that change often but not continuously (on the scale of minutes to hours). It employs the RSA and ElGamal encryption schemes, as well as techniques such as threshold cryptography and proactive secret sharing.

Download Website Updated 26 Mar 2001 Cryptix SASL

Screenshot
Pop 38.47
Vit 1.49

The Cryptix SASL Library is an implementation of the Java SASL bindings and a number of SASL mechanisms.

Download Website Updated 17 Nov 2011 Cyrus SASL

Screenshot
Pop 329.05
Vit 14.74

The Cyrus SASL library is a generic library for easy integration of secure network authentication to any client or server application. It supports authentication via standard plaintext methods as well as CRAM-MD5 and DIGEST-MD5 shared secret methods and KERBEROS_V4 and GSSAPI Kerberos methods. The SASL protocol framework is used by SMTP, IMAP, ACAP, LDAP, and other standard protocols.

Screenshot

Project Spotlight

InstantClick

A library that makes following links in your Web site instant.

Screenshot

Project Spotlight

Terrier

A probabilistic Java toolkit for building search engines.