1971 projects tagged "Security"

Download Website Updated 12 May 2014 tinc

Screenshot
Pop 601.33
Vit 73.19

tinc is a Virtual Private Network (VPN) daemon that uses tunneling and encryption to create a secure private network between multiple hosts on the Internet. This tunneling allows VPN sites to share information with each other over the Internet without exposing any information.

No download Website Updated 11 Aug 2004 tinysofa classic server

Screenshot
Pop 22.91
Vit 1.00

tinysofa classic server is a small, fast and secure operating system. It is Linux 2.4 based, and is compiled with IBM's stack smashing protection patch for GCC. It features a small installation size, APT as an advanced package management tool, secure defaults and services, and much more.

Download Website Updated 01 Nov 2006 tkccrypt

Screenshot
Pop 26.83
Vit 1.00

tkccrypt is a small text file editor frontend for Peter Selinger's ccrypt written in basic Tcl/Tk. The program allows opening and storing only encrypted files, and it guarantees that the decrypted content is never written to disk. Its target audience is made up of users who don't feel confident using a console encryption tool, but need encryption for some text data. The dependency only on ccrypt and Tcl/Tk makes this program very easy to run on many Unix systems.

Download Website Updated 19 Jun 2008 tmin

Screenshot
Pop 18.97
Vit 1.43

tmin is a quick and simple tool to minimize the size and syntax of complex test cases in automated security testing. It is meant specifically for dealing with unknown or complex data formats (without the need to tokenize and re-serialize testcases), and for easy integration with UI testing harnesses.

No download Website Updated 21 Aug 2011 tomld

Screenshot
Pop 12.08
Vit 32.12

Tomld (tomoyo learning daemon) is an extension to the Tomoyo security framework. Tomoyo increases security by confining applications and services into domains using rules. Tomld automates this process, helping users harden their systems more easily. To do this, tomld starts in learning mode, creates Tomoyo domains, collects rules, changes them, and, once the rules appear to be complete, tomld enforces the policy.

Download Website Updated 03 Nov 2005 trackpeer

Screenshot
Pop 36.95
Vit 1.47

trackpeer is an agent that helps network and server administrators with tracking their users' computers. It makes it possible to determine the MAC addresses of computers over a network, even when the computers are behind NATed gateways. This agent is intended to be used by the administrators who need to identify and locate malicious computers and virus-infected computers in a network such as a middle-sized wireless LAN, public Ethernet jack system, campus, or corporate network.

Download Website Updated 11 Mar 2003 trafcalc

Screenshot
Pop 17.89
Vit 1.00

Trafcalc calculates the size of the TCP-payload on a system via packet capturing and connection tracking at the user level instead of the IP level.

Download No website Updated 11 Aug 2003 trux_motion

Screenshot
Pop 28.98
Vit 1.00

trux_motion is a simple program for detecting motion between a pair of JPEG images. It uses the GD library to load the JPEGs, and it uses a simple, fairly fast algorithm for detecting motion.

No download Website Updated 23 Oct 2002 tsocks

Screenshot
Pop 61.80
Vit 4.12

tsocks provides transparent network access through a SOCKS version 4 or 5 proxy (usually on a firewall). tsocks intercepts the calls applications make to create TCP connections and determines if they can be directly accessed or need the SOCKS server. If they need the SOCKS server they connection is negotiated with the server transparently to the application. This allows existing applications to use SOCKS without recompilation or modification. tsocks is a wrapper library for the libc connect() call.

Download Website Updated 22 Apr 2006 ttmap

Screenshot
Pop 29.75
Vit 1.00

ttmap passively analyzes values of TCP Timestamps in captured IP packets. After collecting enough data, it computes characteristic remote machine parameters. These values let it guess remote operating systems and identify unique machines behind a single IP address. For example, it can analyze remote IP load-balanced clusters.

Screenshot

Project Spotlight

P-rout

A tool for collecting and viewing data from a Nedap PowerRouter.

Screenshot

Project Spotlight

Ingo

A mail filtering manager, supporting Sieve, procmail, maildrop and IMAP filters.