CryptNET Passgen (passgen) is a password generator. It generates a list of password candidates for the user to choose from by mapping operating system sources of pseudo-randomness into printable character arrays using a mod operation. A number of available command line options gives it a great deal of flexibility. It is capable of generating passwords composed of printable characters, alphanumeric characters, alphabetic characters, or only numeric characters.
Foremost is a console program that recovers files based on their headers, footers, and internal data structures. This process is commonly referred to as data carving. Foremost can work on image files, such as those generated by dd, Safeback, Encase, etc., or directly on a drive. The headers and footers can be specified by a configuration file, or you can use command line switches to specify built-in file types. These built-in types look at the data structures of a given file format, allowing for a more reliable and faster recovery. It was originally developed by the United States Air Force Office of Special Investigations and The Center for Information Systems Security Studies and Research.
Gircap is a set of tools to help you use the widely unknown "capabilities" that Linux has in place of conventional Unix superuser privilege. That means you can give programs and processes only as much privilege as they need and greatly limit your security exposure due to system bugs. A Linux kernel patch fixes some basically broken aspects of capabilities. setcap and getcap let you set and show capabilities of a running process. capexec runs a program with certain capabilities, UID, GID, and supplemental GIDs. It can be used to have init start a daemon with only a subset of init's privileges. binfmt_capx is an executable interpreter in the form of a loadable kernel module. It lets you do a setuid kind of thing for files, only with fine grained capabilities. This is a cheap substitute for real "file capabilities."
IDABench is a Web interface to many intrusion analysis tools. By the use of simple plug-ins, it allows an analyst to twist and turn hourly packet logs through such utilities as tcpdump, ngrep, tethereal, etc. Output is textual web pages, gnuplot graphs, and downloadable composite binary dumpfiles. Based on the US Navy's SHADOW intrusion detection system, IDABench simplifies the writing of tcpdump filters, allows regular- expression context matching, and through a simple plugin API, can be extended to include other libpcap- based analysis tools, such as Snort, p0f, etc.
Lizard Safeguard PDF Security software encrypts PDF documents to prevent unauthorized viewing, copying, sharing, modifying, printing, and saving in unprotected form. It can also restrict the number of times an authorized operation can be performed. It prevents screenshots from being taken. Documents can be set to expire after a certain time, and permission to use a document can be instantly revoked. The software can be rebranded with your own company information. A simple-to-use Web-based administration system lets you control customer access.
OneTime is a command-line encryption program that uses the one-time pad algorithm to allow two parties to communicate securely, without worrying about unauthorized people listening in. It compresses plaintext input to save pad, has features that assist with the bureaucracy of pad management, and comes with built-in help.