1971 projects tagged "Security"

Download Website Updated 28 Mar 2012 Astaro Security Gateway

Screenshot
Pop 1,335.36
Vit 33.34

Astaro Security Gateway (formerly Astaro Security Linux) is an all-in-one network security gateway that includes a firewall, intrusion protection, antivirus, spam protection, URL filtering, and a VPN gateway. Features include a modern packet filter, intrusion detection and prevention, portscan detection, application control, content filtering, virus detection for email and Web traffic, profile handling, L2TP, IPSec, SSL, and PPTP VPN tunneling, spam blocking, proxies for HTTPS, HTTP, FTP, POP3, SMTP, DNS, VoIP, SOCKS, and Ident, logging, and reporting. It supports Ethernet, VLAN, PPP, PPPoE, PPPoA, Cable Modem, IPv6, QoS, Link Aggregation, and WAN-Uplink-Load balancing in routing, and bridge mode. The WebAdmin GUI, Install Wizard, Change Tracking, Printable Configuration, and Up2Date service make it easy to install, manage, and maintain.

No download Website Updated 01 May 2009 audio-entropyd

Screenshot
Pop 83.89
Vit 4.17

audio-entropyd feeds the /dev/random device with entropy data read from an audio device. The audio data is not copied as is, but first 'de-biased' and analyzed to determine how many bits of entropy are in it. This program is useful for systems doing many cryptographic tasks like VPN endpoints or GPG clients; it helps prevent the /dev/random device from being depleted and blocking reads.

Download Website Updated 21 Jul 2012 authforce

Screenshot
Pop 70.57
Vit 3.91

Authforce is an HTTP authentication brute forcer. Using various methods, it attempts brute force username and password pairs for a site. It has the ability to try common usernames and passwords, username derivations, and common username/password pairs. It is used both to test the security of your site and to highlight the insecurity of HTTP authentication due to the fact that users just don't pick good passwords.

Download Website Updated 01 Sep 2003 Automated Password Generator

Screenshot
Pop 328.28
Vit 5.42

Automated Password Generator is a set of tools for random password generation including a standalone password generator, an RFC972 password generation server, and a Perl client for the password generation server. These feature a built-in X9.17 random number generator, and 35 modes of password generation, including pronounceable password generation.

Download Website Updated 30 Jan 2001 AVAcl

Screenshot
Pop 28.35
Vit 1.00

AVAcl is intended to be called from within AV scanning scripts such as Inflex and AMaViS, to provide an ACL type facility such that adminitrators can provide finer control over their file type/name/content/email blocking.

No download Website Updated 30 Jan 2012 Bastille Linux / Unix

Screenshot
Pop 379.33
Vit 14.79

Bastille Unix (formerly Bastille Linux) aims to be the most comprehensive, flexible, and educational Security Hardening Program for Red Hat (Fedora Core, Enterprise Linux, and original Red Hat), SuSE, Gentoo, Mandrake, and Debian Linux, as well as HP-UX and Mac OS X. Virtually every task it performs is optional, providing immense flexibility. It educates the installing admin regarding the topic at hand before asking any question. The interactive nature allows the program to be more thorough when securing, while the educational component produces an admin who is less likely to compromise the increased security.

No download Website Updated 25 Oct 2004 BCWipe

Screenshot
Pop 50.33
Vit 1.73

BCWipe securely erases data from magnetic and solid-state memory, by repeatedly overwriting special patterns in the files to be destroyed. In normal mode, 34 patterns are used (of which 8 are random); in quick mode, U.S. DoD (Department of Defence) 5200.28 standard are used with 7-pass wiping; and in custom mode, U.S. DoD 5200.28 standards are used with a user-defined number of passes.

Download Website Updated 12 Jul 2009 BeeCrypt

Screenshot
Pop 218.03
Vit 6.55

BeeCrypt is an ongoing project to provide strong and fast cryptography in the form of a toolkit usable by commercial and open source projects. Included in the library are entropy sources, random generators, block ciphers, hash functions, message authentication codes, multiprecision integer routines, and public key primitives.

Download No website Updated 30 Jan 2001 BestCrypt

Screenshot
Pop 78.97
Vit 1.76

A BestCrypt volume is accessible as a regular filesystem on a correspondent mount point. The data stored on a BestCrypt volume is stored in the container file. A container is a regular file or block device, so it is possible to backup, move, or copy it to other disk (CD-ROM or network, for instance) and continue to access encrypted data using BestCrypt. BestCrypt supports the following encryption algorithms: GOST in Cipher Feedback mode and BLOWFISH, DES, TWOFISH in Cipher Block Chaining mode. A container can be formatted for any filesystem supported by Linux (MINIX, EXT, EXT2, FAT, FAT32, and others) and mounted as an additional volume to any mount point.

Download Website Updated 30 Jan 2001 BFBTester - Brute Force Binary Tester

Screenshot
Pop 79.09
Vit 1.44

BFBTester is good for doing quick, proactive security checks of binary programs. BFBTester will perform checks of single and multiple argument command line overflows and environment variable overflows. It can also watch for tempfile creation activity to alert the user of any programs using unsafe tempfile names.

Screenshot

Project Spotlight

AOLserver

A multithreaded, Tcl-enabled, dynamic Web server.

Screenshot

Project Spotlight

QuickMSG

A secure chat app.