strongSwan is a complete IPsec implementation for the Linux, Android, Maemo, FreeBSD, and Mac OS X operating systems. It interoperates with with most other IPsec-based VPN products via the IKEv2 or IKEv1 key exchange protocols. The focus of the strongSwan project is on strong authentication mechanisms using X.509 public key certificates and optional secure storage of private keys on smartcards through a standardized PKCS#11 interface. A rich choice of modular plugins adds additional features like Trusted Network Connect or advanced cryptographical algorithms.
The CyaSSL embedded SSL library is a lightweight SSL library written in ANSI C and targeted for embedded and RTOS environments, primarily because of its small size, speed, and feature set. It is commonly used in standard operating environments and cloud services as well because of its royalty-free pricing and excellent cross platform support. CyaSSL supports industry standards up to the current TLS 1.2 and DTLS 1.2 levels, is up to 20 times smaller than OpenSSL, and offers progressive ciphers such as HC-128, RABBIT, and NTRU.
Shiny Menu Icons is a unique icon library covering an extremely wide range of topics, from standard file operations, navigation, and document processing to user management, online communications, security, and a lot more. Each of the 1014 icons in this collection is available in 4 popular file formats (PNG, GIF, BMP, and ICO) and resolutions (48x48, 32x32, 24x24, 20x20, and 16x16). The set can be efficiently used in the interface of any modern software.
setiQuest is a project that empowers earthlings everywhere to become active participants in the search for cosmic company. It includes two software systems. SonATA detects the evidence of extra-terrestrial technology in data that has been collected, and SetiQuest Explorer is an Android app through which anyone can access the same telescope data and visually detect evidence of alien technology.
gigacount is a smartphone app that simulates radiation measurement. The camera takes pictures of objects. It stores the pictures as files or transmits them to a service on the network. A user sees the preview of the camera and a number that represents the (estimated) value of radiation. She can set up the application to display random numbers and which format/unit. It also includes options to alter preview color or display a static meter background.
Red language is a native-code compiled functional, imperative, symbolic, and homoiconic programming language that re-uses most of REBOL's syntax and semantics. Both static and JIT compilation support are planned. A strong emphasis is made on concurrency and both task and data parallelism support using an actor-like abstraction and parallel collections (Scala-like). The target range of usage spreads from low-level system programming (thanks to the built-in Red/System C-level DSL) and embedded systems, up to high-level scripting, with an optional REPL console.
Large Business Icons is a collection of royalty-free icons that includes a wide variety of images related to business and banking. It includes icons representing various financial operations, documents, and people. Each image is provided in 6 resolutions (16x16, 24x24, 32x32, 48x48, 256x256, and 512x512 pixels) and 4 image formats (GIF, PNG, ICO, and BMP). You can use these icons for desktop and online applications.
All Menu Icons provides over 13,000 icons for only 3 cents apiece. Design desktop and mobile applications, develop Web sites, or use icons in printed media with no royalties or usage restrictions. This extensive bundle includes thousands of icons in a number of variations, supplying each menu icon in various sizes, file formats, color resolutions, and visual states.
dnscrypt-proxy acts as a DNS proxy between a regular client, like a DNS cache or an operating system stub resolver, and a DNSCrypt-aware resolver, like OpenDNS. The DNSCrypt protocol focuses on securing communications between a client and its first-level resolver. While not providing end-to-end security, it protects the local network (which is often the weakest link in the chain) against man-in-the-middle attacks. It also provides some confidentiality to DNS queries.