RSS 1210 projects tagged "Security"

Download No website Updated 20 Jan 2011 AAFID2

Screenshot
Pop 135.94
Vit 1.00

AAFID (Autonomous Agents for Intrusion Detection) is a distributed monitoring architecture with an orientation towards Intrusion Detection developed at the CERIAS at Purdue University. AAFID2 is a prototype implementation of the architecture that includes several ready-to-work agents, plus development facilities for writing your own.

No download Website Updated 30 Jan 2001 Aduva Manager

Screenshot
Pop 70.48
Vit 1.42

Aduva Manager is a package manager with automatic download and dependency checking, system sanity checking, a package security updater, kernel compilation/installation, and a hardware plug-and-play installer for RH6.x boxes.

Download Website Updated 18 May 2001 AES Encryption for Shell Scripts

Screenshot
Pop 142.91
Vit 1.76

AES Encryption for Shell Scripts provides strong encryption/decryption using the Advanced Encryption Standard algorithm "Rijndael" to do 128-bit encryption. It is intended for use in shell scripts or as part of a larger cryptosystem, not as a standalone program.

No download Website Updated 07 May 2001 Alamin GSM SMS Gateway

Screenshot
Pop 210.80
Vit 2.73

The Alamin GSM SMS Gateway is a group of daemons that allows you to send/receive SMS messages from any GSM device that supports AT+ commands (GSM modems or GSM mobile phones) or supported by Gnokii. A client program allows you to send messages from any IP client. An SMTP interface is provided to allow MTAs to send SMS directly to the GSM network. IMP (Incoming Message Processor) modules allows you to extend functionality to implement banking, network administration, bd querys, etc. from a GSM mobile phone.

Download Website Updated 28 Jul 2001 anonvelope

Screenshot
Pop 56.83
Vit 1.47

anonvelope is a mail-message processing program that is designed to allow the message to make full use of Type-I (cpunk-style) remailers. It is especially designed to work with Pine, but it is possible it may be used with other MUAs.

Download Website Updated 30 Jan 2001 arc

Screenshot
Pop 78.61
Vit 1.00

arc is an ASN.1 compiler written by FORGE Research for use in internal projects. It is being released under a BSD-like licence. arc creates Java source code that uses the basic ASN.1 classes that were created for use with other FORGE projects. These basic ASN.1 classes are included in the arc distribution.

Download Website Updated 28 Mar 2012 Astaro Security Gateway

Screenshot
Pop 1,377.64
Vit 34.45

Astaro Security Gateway (formerly Astaro Security Linux) is an all-in-one network security gateway that includes a firewall, intrusion protection, antivirus, spam protection, URL filtering, and a VPN gateway. Features include a modern packet filter, intrusion detection and prevention, portscan detection, application control, content filtering, virus detection for email and Web traffic, profile handling, L2TP, IPSec, SSL, and PPTP VPN tunneling, spam blocking, proxies for HTTPS, HTTP, FTP, POP3, SMTP, DNS, VoIP, SOCKS, and Ident, logging, and reporting. It supports Ethernet, VLAN, PPP, PPPoE, PPPoA, Cable Modem, IPv6, QoS, Link Aggregation, and WAN-Uplink-Load balancing in routing, and bridge mode. The WebAdmin GUI, Install Wizard, Change Tracking, Printable Configuration, and Up2Date service make it easy to install, manage, and maintain.

No download Website Updated 30 Jan 2012 Bastille Linux / Unix

Screenshot
Pop 392.20
Vit 14.92

Bastille Unix (formerly Bastille Linux) aims to be the most comprehensive, flexible, and educational Security Hardening Program for Red Hat (Fedora Core, Enterprise Linux, and original Red Hat), SuSE, Gentoo, Mandrake, and Debian Linux, as well as HP-UX and Mac OS X. Virtually every task it performs is optional, providing immense flexibility. It educates the installing admin regarding the topic at hand before asking any question. The interactive nature allows the program to be more thorough when securing, while the educational component produces an admin who is less likely to compromise the increased security.

No download Website Updated 25 Oct 2004 BCWipe

Screenshot
Pop 53.44
Vit 1.73

BCWipe securely erases data from magnetic and solid-state memory, by repeatedly overwriting special patterns in the files to be destroyed. In normal mode, 34 patterns are used (of which 8 are random); in quick mode, U.S. DoD (Department of Defence) 5200.28 standard are used with 7-pass wiping; and in custom mode, U.S. DoD 5200.28 standards are used with a user-defined number of passes.

Download No website Updated 30 Jan 2001 BestCrypt

Screenshot
Pop 80.39
Vit 1.76

A BestCrypt volume is accessible as a regular filesystem on a correspondent mount point. The data stored on a BestCrypt volume is stored in the container file. A container is a regular file or block device, so it is possible to backup, move, or copy it to other disk (CD-ROM or network, for instance) and continue to access encrypted data using BestCrypt. BestCrypt supports the following encryption algorithms: GOST in Cipher Feedback mode and BLOWFISH, DES, TWOFISH in Cipher Block Chaining mode. A container can be formatted for any filesystem supported by Linux (MINIX, EXT, EXT2, FAT, FAT32, and others) and mounted as an additional volume to any mount point.

Screenshot

Project Spotlight

QtWebSockets

A Websocket implementation in Qt.

Screenshot

Project Spotlight

DRBL

A diskless or systemless environment for client machines.