jEncrypt is a commandline file encryption archiver. Files are encrypted with the AES-CTR mode, which was recommended by the National Institute of Standards and Technology in 2001 (NIST SP 800-38A). AES-CTR mode only provides confidentiality. It requires a message authentication code such as CBC-MAC to ensure an encrypted message is not accidentally modified or maliciously tampered with, which jEncrypt currently does not provide.
iptables-bash_completion provides programmable completion for the iptables and ip6tables programs. iptables options are shown only if they are valid at the current context. It supports completion of options, matches, and targets, and dynamic retrieval of data from the system, including chains, set names, interfaces, and hostnames. Environment variables allow completion options to be tuned. IP and MAC addresses can be supplied using a file.
dynalogin is a distributed two-factor authentication suite that combines a secure UNIX server and API with an Android soft token. Open standards (HOTP, TOTP, and soon OCRA) are used for one-time passwords. A C library is provided for inclusion in existing software and Web sites. OpenID (using SimpleID) is supported for Web applications and single sign on. PAM is supported for easy UNIX and LDAP integration (SASL, RADIUS, and JAAS in development). It works with Google Authenticator or the dynalogin Android application.
losetup-utils are three bash scripts that attempt to make the use of losetup a bit easier and faster. losetup can be fast, easy, and practical if you need to transport sensitive information over the Internet or in CD's, DVD's, or a pendrive. Also, if you want to store private data on your hard disk or in the cloud, an encrypted volume can be a convenient choice. The types of encryption can be any installed on the system.
WormTrack is a network IDS that allows detection of scanning worms on a LAN by monitoring anomalous ARP traffic. This allows detection of scanning threats on the network without having privileged access on a switch to set up a dedicated monitor port. It does not require constant updating of the rules engine to address new threats.