RSS 3 projects tagged "Mac OS X"

No download Website Updated 03 Mar 2011 RedWolf Security Threat Generator

Screenshot
Pop 137.99
Vit 2.47

RedWolf is a security threat simulator that tests security system effectiveness. Its threat generation capabilities include email, IM, malware, P2P, social networking, VoIP, DDoS, and many more. The guiding philosophy is that by generating realistic scenarios in a wide variety of categories, an auditor or organization can assess the effectiveness of network defenses. The scenario suite allows one to verify compliance with PCI-DSS, Sarbanes-Oxley, or HIPAA controls. RedWolf helps identify data loss risks and provides expert recommendations concerning risk mitigation. It reports present findings, recommendations, best practices, and blocking guidance in a straightforward, easily readable format. RedWolf also acts as a 'Red Team' agent, running drills to measure the readiness of your operations staff.

Download Website Updated 28 Feb 2014 Elefant CMS

Screenshot
Pop 259.27
Vit 23.29

Elefant is a full-featured, but refreshingly simple CMS and PHP Web framework. It features an intuitive, streamlined admin interface, a tightly integrated WYSIWYG editor, dynamically embeddable content objects for building dynamic Web sites without touching code, and an extremely fast, secure, and flexible framework for add-ons and themes. The core CMS includes page editing, a blogging engine, site navigation, file and user management, automatic version control, a tool for translators and multilingual site management, and an in-browser theme/layout editor. It is also extensively documented and has a small but friendly and active developer community.

No download No website Updated 28 May 2013 h2H Messenger

Screenshot
Pop 40.14
Vit 2.35

h2H Messenger is a secure messenger client that uses PHP OpenSSL functions, mcrypt, and PHPSecLib to encrypt messages at-rest using RSA keys. The user only creates an account and the application handles the public key generation, key management, key exchange, and encryption and decryption of messages. There are no algorithms or key sizes to choose. It uses strong standards (AES 256, 4096 bit RSA Keys, SHA1, SHA512, etc.) in the background, and requires two-factor authentication using a code sent via SMS or using Asterisk.

Screenshot

Project Spotlight

histofile

A tool that shows histograms of used byte-values in files.

Screenshot

Project Spotlight

Aspose.Imaging for Java

An image processing and manipulation component.