RSS 1483 projects tagged "Security"

No download No website Updated 12 Nov 2012 losetup-utils

Screenshot
Pop 29.77
Vit 22.96

losetup-utils are three bash scripts that attempt to make the use of losetup a bit easier and faster. losetup can be fast, easy, and practical if you need to transport sensitive information over the Internet or in CD's, DVD's, or a pendrive. Also, if you want to store private data on your hard disk or in the cloud, an encrypted volume can be a convenient choice. The types of encryption can be any installed on the system.

Download Website Updated 15 Dec 2003 /dev/random for HP-UX 11.00

Screenshot
Pop 34.68
Vit 1.43

/dev/random for HP-UX 11.00 provides a device driver that generates high-quality random numbers.

No download Website Updated 15 Nov 2007 123 Protect

Screenshot
Pop 20.54
Vit 1.00

123 Protect is a solution to manage member accounts on a Web site and protect resources on the site with passwords. Passwords can be used to protect the whole site, individual pages, and directories. Password protection recursively applies to contents of a directory. The system provides three levels of administration, a user-friendly interface, an advanced membership management system, and multi-language support. It doesn't require knowledge of PHP or HTML.

Download No website Updated 20 Jan 2011 AAFID2

Screenshot
Pop 135.74
Vit 1.00

AAFID (Autonomous Agents for Intrusion Detection) is a distributed monitoring architecture with an orientation towards Intrusion Detection developed at the CERIAS at Purdue University. AAFID2 is a prototype implementation of the architecture that includes several ready-to-work agents, plus development facilities for writing your own.

Download Website Updated 27 Jul 2001 ACID

Screenshot
Pop 145.62
Vit 1.00

The Analysis Console for Intrusion Databases (ACID) is a PHP-based analysis engine to search and process a database of incidents generated by security-related software such as IDSes and firewalls (e.g., Snort or ipchains). It provides a search interface for finding alerts matching practically any criteria. This includes arrival time, signature time, source/dest address/port, flags, payload, etc. ACID also provides the ability to annotate and logically group related events, delete false positives, or archive alerts among databases. Finally, a variety of statistics and graphs can be generated based on time, IP address, ports, alert classification, and sensor.

Download Website Updated 11 Apr 2011 ACL2

Screenshot
Pop 74.62
Vit 4.96

ACL2 is a mathematical logic, programming language, and mechanical theorem prover based on the applicative subset of Common Lisp. It is an "industrial-strength" version of the NQTHM or Boyer/Moore theorem prover, and has been used for the formal verification of commercial microprocessors, the Java Virtual Machine, interesting algorithms, and so forth.

Download Website Updated 18 May 2001 AES Encryption for Shell Scripts

Screenshot
Pop 143.08
Vit 1.76

AES Encryption for Shell Scripts provides strong encryption/decryption using the Advanced Encryption Standard algorithm "Rijndael" to do 128-bit encryption. It is intended for use in shell scripts or as part of a larger cryptosystem, not as a standalone program.

Download Website Updated 24 Jan 2002 AES for Ruby

Screenshot
Pop 29.34
Vit 1.42

The AES for Ruby module provides compact and fast AES encryption for Ruby programs, without the overhead of linking to large third-party encryption libraries.

No download Website Updated 15 Nov 2010 AGPF KeyRec

Screenshot
Pop 22.89
Vit 35.42

AGPF KeyRec is powerful software to recover the default WPA passphrases of the specified models of Telecom Italia's AGPF routers.

Download Website Updated 16 Apr 2013 AIDE

Screenshot
Pop 443.09
Vit 4.24

AIDE (Advanced Intrusion Detection Environment) is a file and directory integrity checker. It creates a database from the regular expression rules that it finds from the config file. Once this database is initialized it can be used to verify the integrity of the files. Several message digest algorithms are used. All of the usual file attributes can also be checked for inconsistencies.

Screenshot

Project Spotlight

naken_asm

A microcontroller assembler.

Screenshot

Project Spotlight

SRFirewall

An easy to use, but still quite capable firewall for Netfilter/iptables.