RSS 14 projects tagged "GNOME"

Download Website Updated 02 Nov 2004 Seahorse

Screenshot
Pop 118.84
Vit 5.49

Seahorse is a Gnome front end for GnuPG, the GNU Privacy Guard program. It is a tool for secure communications and data storage. Data encryption and digital signature creation can easily be performed through a GUI and Key Management operations can easily be carried out through an intuitive interface.

No download Website Updated 05 May 2001 Topsecret_Ftp

Screenshot
Pop 13.49
Vit 1.00

Topsecret_Ftp is a gui interface for Topsecret_Net. It lets you transfer files across a network with your own keys, which are modified with each use.

Download Website Updated 29 Nov 2001 GNOME Enigma

Screenshot
Pop 14.70
Vit 67.27

GNOME Enigma (Genigma) emulates an Enigma, a German cryptographic machine used during World War II.

Download Website Updated 10 Mar 2003 GPassGuard

Screenshot
Pop 28.98
Vit 1.42

GPassguard is a GTK+ frontend to the *PassGuard suite, which manages passwords in an encrypted file so that you only have to remember one. It uses the PassGuard Framework and can be interfaced with any kind of encryption via a plugin system. It allows you to copy passwords to the clipboard.

Download Website Updated 22 Jun 2003 GCipher

Screenshot
Pop 21.63
Vit 1.00

GCipher is a simple encryption tool to work with home- grown encryption algorithms. It can run as either a GUI, a command-line application, or a network proxy.

No download Website Updated 21 Aug 2008 Akeni Instant Messaging Server Pro

Screenshot
Pop 88.74
Vit 3.33

Akeni Instant Messaging Server Pro is a client/server instant messaging platform that allows companies to host their own secured private IM system. The client has an user interface similar to AIM, ICQ, or MSN Messenger. It supports all the standard IM features such as chat, group conference, presence management, file transfer, offline messages, and emergency alert/notification. Extra features include contact management and optional tabbed chat sessions. The server has advanced administration tools for managing user accounts, client-side logging capabilities, and peer-to-peer file transfers. It can be set up on a private network without connecting to the Internet, and can easily be set up for use inside and outside of the company firewall.

No download Website Updated 01 Jan 2007 Gringotts-Shlomif Patch

Screenshot
Pop 33.23
Vit 2.97

Gringotts-Shlomif Patch is a patch for the Gringotts encrypted note manager that enables compilation with recent versions of Gtk+, adds keyboards shortcuts to the menus, and fixes a bug with the search function.

Download Website Updated 03 Aug 2006 Gnome SSH Tunnel Manager

Screenshot
Pop 50.62
Vit 2.60

gSTM, the Gnome SSH Tunnel Manager, is a front-end for managing SSH-tunneled port redirects. It stores tunnel configurations in a simple XML format. The tunnels, with local and remote port redirections, can be created, deleted, modified, and individually started and stopped through one simple interface. It is useful for anyone wanting to securely access private services over an encrypted tunnel.

Download Website Updated 28 Feb 2008 BlueProximity

Screenshot
Pop 81.66
Vit 2.94

BlueProximity helps add a little more security to the desktop. It does so by detecting a certain Bluetooth device, most likely a mobile phone, and keeping track of its distance. If it is moved away from the computer and the distance is above a certain level (no measurement in meters is possible) for a given time, it automatically locks the desktop (or starts any other shell command wanted). Once away, the computer awaits its master's return: if the device is nearer than a given level for a set time, the computer unlocks without any interaction (or starts any other shell command wanted).

Download Website Updated 11 Nov 2011 Gringotts

Screenshot
Pop 80.35
Vit 3.28

Gringotts is a small utility that allows you to jot down sensitive data (passwords, PINs, small files, etc.) in an easy-to-read, easy-to-access, and most of all very secure form. It lets the user choose from among eight strong encryption algorithms (RIJNDAEL-128, RIJNDAEL-256, SERPENT, TWOFISH, CAST-256, SAFER+, LOKI97, 3DES), two hashing algorithms (SHA1, RIPEMD 160), and two compression techniques (ZLib and BZip2) with four compression ratios. It allows the user to use any file or an entire floppy disk as a password, as an alternative to the usual text string.

Screenshot

Project Spotlight

brothersinarms

A Super Mario Bros. game.

Screenshot

Project Spotlight

Text Fiction

A Z-Machine for Android.