RSS 196 projects tagged "Linux"

Download Website Updated 08 Apr 2014 GNUnet

Screenshot
Pop 700.27
Vit 174.06

GNUnet is a peer-to-peer framework with focus on providing security. All peer-to-peer messages in the network are confidential and authenticated. The framework provides a transport abstraction layer and can currently encapsulate the network traffic in UDP, TCP, HTTP, HTTPS, or direct 802.11 (WLAN). GNUnet supports accounting to provide contributing nodes with better service. The services built on top of the framework include anonymous file sharing and a virtual network providing IPv4-IPv6 transition via protocol translation over the P2P network.

No download Website Updated 30 Sep 2001 @1 Script Secure

Screenshot
Pop 19.49
Vit 67.72

@1 Script Secure protects your existing scripts by checking the locations of the forms (referers) calling your scripts. If the forms are not located on your domain, the execution of the scripts will be terminated.

No download Website Updated 01 Dec 2001 SecurityFocus ARIS Extractor

Screenshot
Pop 27.50
Vit 67.26

SecurityFocus ARIS Extractor is a sophisticated Intrusion Detection System (IDS) log analyzer and reporting system, integrated with the SecurityFocus ARIS web site. It allows administrators to upload Intrusion Detection System (IDS) logs to the SecurityFocus ARIS Web site, producing sophisticated reporting, and research attacks and events. By filtering out insignificant or benign data and converting it to a common (XML) format, ARIS extractor streamlines incident reporting for both security professionals and home users, allowing IDS operators to focus only on relevant attacks and incidents. It allows you to analyze and archive logged incidents, cross reference incidents/attacks with the SecurityFocus Vulnerability Database, look up contact information for offending IP addresses, generate personal incident statistics and reports, automatically identify and report important incidents, reduce the amount of time spent parsing IDS logs, and generate daily summary reports, delivered by email (optional). All of this is done without revealing any information that could be used to discern your identity. It can be configured to obfuscate IP addresses, names, and other pertinent details before submitting them to the ARIS Analyzer web site. It supports Snort, Cisco Secure IDS, Dragon, NetProwler, RealSecure, BlackICE Defender, and ICEPac.

No download Website Updated 09 Jun 2003 OpenXAdES

Screenshot
Pop 39.34
Vit 63.00

OpenXAdES enables people to work with legally-binding digital signatures (primarily giving and verifying them). Legislation often defines a set of requirements that legal digital signature technologies and infrastructures must be compliant with, and OpenXAdES aims at meeting many, if not all, such requirements from different legislations.

Download Website Updated 03 Oct 2003 The Sleuth Kit

Screenshot
Pop 61.48
Vit 62.07

The Sleuth Kit is a collection of open source file system forensics tools that allow one to view allocated and deleted data from NTFS, FAT, FFS, and EXT2FS images. The Autopsy Forensic Browser provides a graphical interface to The Sleuth Kit.

Download Website Updated 24 Dec 2013 Tor

Screenshot
Pop 797.73
Vit 61.65

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Download Website Updated 27 Nov 2003 Kernel Security Checker

Screenshot
Pop 25.10
Vit 61.62

Kernel Security Checker is a useful tool to locate attackers residing within a system by employing a direct analysis of the kernel through /dev/kmem and bypassing the hiding techniques of the intruder (kernel static recompilation or use of LKMs). It can find the modified syscalls from userspace, detect the promiscuous interfaces, and find the modifications applied to a protocol.

Download Website Updated 11 Dec 2003 Host4NET

Screenshot
Pop 56.84
Vit 61.51

Host4net is a control panel solution for Web hosting companies and ISP administration, with extended financial and commercial features, made to ease the process of administration in a high density user environment. For now, it depends on Webmin.

Download Website Updated 01 Apr 2014 Aircrack-ng

Screenshot
Pop 638.90
Vit 61.36

aircrack-ng is a set of tools for auditing wireless networks. It's an enhanced/reborn version of aircrack. It consists of airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), airdecap (decrypts WEP/WPA capture files), and some tools to handle capture files (merge, convert, etc.).

Download Website Updated 29 Jan 2005 GPGlist

Screenshot
Pop 13.56
Vit 58.03

GPGlist is a Perl script to implement gpg encrypted alias lists in a mail server such as Sendmail or Postfix. It uses one XML config file to store information about lists. It backs up messages if an error occours, and sends out error messages to the sender of the mail. You can decide whether or not a list only accepts encrypted messages.

Screenshot

Project Spotlight

lazygal

A static Web gallery generator.

Screenshot

Project Spotlight

Model Railroad System

A software package that can help you run your railroad.