608 projects tagged "Cryptography"

Download Website Updated 11 Jan 2002 Python GnuPGInterface

Screenshot
Pop 41.50
Vit 2.28

GnuPGInterface is a Python module to interface with GnuPG . It concentrates on interacting with GnuPG via filehandles, providing access to control GnuPG via versatile and extensible means. It is based on GnuPG::Interface.

Download Website Updated 05 Jan 2002 Linux VPN Masquerade

Screenshot
Pop 67.97
Vit 2.72

Linux VPN Masquerade allows you to use an IPSec or PPTP VPN host (client or server) behind a Linux masquerading firewall. No more hogging the cable modem when you need to connect to the office network.

Download Website Updated 23 Dec 2001 fsh

Screenshot
Pop 64.70
Vit 2.49

fsh is a tool for establishing an ssh tunnel for remote execution of commands without requiring an ssh authentication on every connection. Once the tunnel is established, remote commands can be executed almost instantaneously. This makes systems such as remote cvs over ssh much faster. It includes fcp, an rcp variant that uses fsh.

Download Website Updated 14 Dec 2001 Come And Go Encryption

Screenshot
Pop 19.29
Vit 67.44

Come And Go Encryption (CAG) is a simple program to encrypt files with a special key. This key is a random garbage file, and it is XOR-ed with the file to render it unusable by normal methods. It uses the principle of the one-time pad, but it is not unbreakable. It can stream the decrypted file to STDOUT for use in pipes (i.e., mplayer movie viewing, xv image viewing, etc.).

Download Website Updated 13 Dec 2001 CDSA 2

Screenshot
Pop 38.94
Vit 1.49

CDSA stands for Common Data Security Architecture. It provides a security framework that includes cryptographically signed modules to present an abstracted unified API to the application developer to perform cryptographic and security related operations. It also includes hardware support for cryptographic tokens and biometric devices, such as thumbprint scanners. Intel has implemented the CDSA 2 specification and released it as open source.

Download Website Updated 13 Dec 2001 ssh

Screenshot
Pop 200.46
Vit 4.58

SSH (Secure Shell) is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another. It provides strong authentication and secure communications over insecure channels. It is intended as a replacement for rlogin, rsh, rcp, and rdist.

Download Website Updated 07 Dec 2001 Twofish for Python

Screenshot
Pop 29.03
Vit 1.00

Twofish-py is a Python module and associated support files that add Twofish encryption/decryption support to Python.

Download Website Updated 29 Nov 2001 GNOME Enigma

Screenshot
Pop 15.20
Vit 67.56

GNOME Enigma (Genigma) emulates an Enigma, a German cryptographic machine used during World War II.

Download No website Updated 20 Nov 2001 crypt++.el

Screenshot
Pop 58.43
Vit 1.81

crypt++.el is a package of Lisp functions that recognize automatically encrypted and encoded (i.e., compressed) files when they are first visited or written. The BUFFER corresponding to the file is decoded and/or decrypted before it is presented to the user. The file itself is unchanged on the disk. When the buffer is subsequently saved to disk, a hook function re-encodes the buffer before the actual disk write takes place.

Download Website Updated 10 Nov 2001 Scrambled Eggs

Screenshot
Pop 13.53
Vit 1.00

Scrambled Eggs allows for a variety of encryption schemes, and has many options. Since it's Perl- based, so you are only limited by what encryption modules are available trough CPAN.

Screenshot

Project Spotlight

WiKID Two-Factor Authentication System

A self-hosted, dual-source two-factor authentication system.

Screenshot

Project Spotlight

Packet Peeper

A network protocol analyzer for Mac OS X.