RSS 157 projects tagged "Security"

No download Website Updated 21 Aug 2008 Akeni Instant Messaging Server Pro

Screenshot
Pop 89.45
Vit 3.33

Akeni Instant Messaging Server Pro is a client/server instant messaging platform that allows companies to host their own secured private IM system. The client has an user interface similar to AIM, ICQ, or MSN Messenger. It supports all the standard IM features such as chat, group conference, presence management, file transfer, offline messages, and emergency alert/notification. Extra features include contact management and optional tabbed chat sessions. The server has advanced administration tools for managing user accounts, client-side logging capabilities, and peer-to-peer file transfers. It can be set up on a private network without connecting to the Internet, and can easily be set up for use inside and outside of the company firewall.

Download Website Updated 14 Apr 2004 Akeni Jabber Client

Screenshot
Pop 38.18
Vit 1.48

Akeni Messenger Jabber Edition is a cross-platform client for Jabber compliant servers. It features an XML-based messaging protocol, private chatting, conference mode, broadcast messages to groups of people, message log, a typing indicator, a full-featured rich-text editor, emoticons, and powerful online presence management.

No download Website Updated 19 Nov 2010 Altimate Firewall

Screenshot
Pop 60.60
Vit 2.32

Altimate Firewall is a small and easy-to-use firewall, based on a hardened Gentoo system. It has an intuitive and easy-to-use Web interface. The Altimate Firewall uses Shorewall (LAN, WAN, DMZ), OpenVPN, PPTPD, IPSEC, and many more. It includes Avira WebGate and MailGate for safer browsing and for securing your email messages. The network settings can be easily managed by a non-professional.

Download Website Updated 02 Oct 2006 Are You Human?

Screenshot
Pop 10.63
Vit 1.00

Are You Human? is a script that uses a graphical test to insure that a human is being dealt with rather than a script. This is useful to avoid automated Web signups or automated attempts to crack passwords. There are many equivalent libraries for other languages but this is the first one for Python. The Python Imaging Library (PIL) is required.

Download Website Updated 26 Oct 2006 Authentic

Screenshot
Pop 42.50
Vit 2.69

Authentic is a Liberty-enabled identity provider aiming to address a broad range of needs, from simple to complex setups. Its Liberty compliance relies on Lasso, a free software implementation of the Liberty Alliance specifications. It is a quixote application and is commonly run inside the Apache Web server.

Download Website Updated 22 Nov 2005 Awesum

Screenshot
Pop 35.44
Vit 1.89

Awesum is a graphical checksum verification utility. It is very easy to use and includes support for both MD5 and SHA checksum algorithms. Unlike many checksum verification utilities, it features a progress bar that makes working with large files (such as CD-ROM ISO images) much more bearable.

Download Website Updated 07 Nov 2003 Better ASN

Screenshot
Pop 17.49
Vit 61.75

Better ASN is a Java ASN.1 API that focuses on speed and efficiency rather than extended functionality. This strategy prescribes one-pass decoding and near 100% encoding efficiency for typical ASN.1 usage patterns. Although BASN was developed for use by a Certificate Authority, the release comes packaged with an ASN.1 to Java compiler, which can be used to generate Java implementations of ASN.1 structures. This allows the API to be used for any Java application that may require ASN.1 decoding/manipulation/encoding.

Download Website Updated 28 Feb 2008 BlueProximity

Screenshot
Pop 79.66
Vit 2.94

BlueProximity helps add a little more security to the desktop. It does so by detecting a certain Bluetooth device, most likely a mobile phone, and keeping track of its distance. If it is moved away from the computer and the distance is above a certain level (no measurement in meters is possible) for a given time, it automatically locks the desktop (or starts any other shell command wanted). Once away, the computer awaits its master's return: if the device is nearer than a given level for a set time, the computer unlocks without any interaction (or starts any other shell command wanted).

Download Website Updated 13 Jul 2010 Bombardier Installer

Screenshot
Pop 68.61
Vit 1.44

Bombardier is a software system that delivers visibility, control, and automation to data center environments. Bombardier provides a means for changes to be rolled out to a network of Linux and Windows servers in a highly controlled way, providing optimum security, logging, and centralized change control.

No download Website Updated 20 Aug 2003 CAKE

Screenshot
Pop 17.09
Vit 62.38

CAKE (Key Addressed Crypto Encapsulation) is a bunch of Python and C++ for implementing the CAKE protocol. The CAKE protocol is a protocol in which all messages have source and destination addresses that are public keys. This is in the same way that IP packets have a source and destination address that is an IP address.

Screenshot

Project Spotlight

JSONMinify

A JSON+C minifier.

Screenshot

Project Spotlight

Open Camera

A camera app for Android.