Perso can handle different types of identity card numbers (e.g. German/Austrian ID-card and passport). It can check the numbers for correctness using the "7-3-1"-checksum algorithm. Also it can extract information from the numbers (e.g. birthday) or generate example numbers using custom values.
wxSFTP aims to be a simple, easy-to-use, and portable SFTP client. "Simple" means that the program will have only the main features needed. The structure consists of a two panel window, one for the local filesystem and another for the remote filesystem. To be easy to use the program is a graphical client that will be HIG compliant.
Bork is a very small, cross-platform file encryption utility using a password-based RC4 algorithm. It is designed to be included in source code form along with the files it encrypts for long-term storage (eg on CD-R). Its minimal external dependencies are designed to make it fairly futureproof.
Secure Back Door (SBD) is a tool that provides ultra-secure and minimal access to a computer, which allows you to run a single command based on a one time key. It is good if you don't want to have an SSH server running all the time, and only want to start it when needed. Because it is written in only a few lines of code, it is hoped that it will be less susceptible to security exploits than a program like SSH.
OpenSignature is a project for the digital signature of documents. It works with all cards supported by OpenSC, and focuses on adding support for cards from accredited Italian CAs. The goal is to provide the first single product capable of supporting cards from multiple vendors/countries. This contrasts the approach taken by card vendors/providers whose software follows an exclusive single-vendor approach. OpenSignature attempts to make a major contribution to interoperability in the digital signature domain, and aims to greatly facilitate the setup of public access points that are currently the objective of several projects in Italy.
DIIT provides a simple tool that can hide a message inside a 24-bit colour image so that knowing how it was embedded, or performing statistical analysis, does not make it any easier to find the concealed information. It also provides a framework for implementing other steganography algorithms for use in the tool.