fsh is a tool for establishing an ssh tunnel for remote execution of commands without requiring an ssh authentication on every connection. Once the tunnel is established, remote commands can be executed almost instantaneously. This makes systems such as remote cvs over ssh much faster. It includes fcp, an rcp variant that uses fsh.
Come And Go Encryption (CAG) is a simple program to encrypt files with a special key. This key is a random garbage file, and it is XOR-ed with the file to render it unusable by normal methods. It uses the principle of the one-time pad, but it is not unbreakable. It can stream the decrypted file to STDOUT for use in pipes (i.e., mplayer movie viewing, xv image viewing, etc.).
CDSA stands for Common Data Security Architecture. It provides a security framework that includes cryptographically signed modules to present an abstracted unified API to the application developer to perform cryptographic and security related operations. It also includes hardware support for cryptographic tokens and biometric devices, such as thumbprint scanners. Intel has implemented the CDSA 2 specification and released it as open source.
SSH (Secure Shell) is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another. It provides strong authentication and secure communications over insecure channels. It is intended as a replacement for rlogin, rsh, rcp, and rdist.
crypt++.el is a package of Lisp functions that recognize automatically encrypted and encoded (i.e., compressed) files when they are first visited or written. The BUFFER corresponding to the file is decoded and/or decrypted before it is presented to the user. The file itself is unchanged on the disk. When the buffer is subsequently saved to disk, a hook function re-encodes the buffer before the actual disk write takes place.