Soffid IAM offers a complete and integrated solution for controlling access to enterprise applications. It provides you with everything you need to obtain accurate information about who uses your systems, manage the whole user provisioning lifecycle, and bring users an enhanced experience by removing the need to enter credentials every time they access your business applications. It provides a single point of audit and control for assessing data security regulatory compliance.
ZedLog is a robust cross-platform input logging tool (A.K.A., a key logger). It is based on a flexible data logging system which makes it easy to get the required data. It features logging of all keyboard and mouse events, a replay simulation tool, logging to a file, and hiding in the background.
Sanewall is a firewall builder for Linux that uses an elegant language abstracted to just the right level. This makes it powerful and easy to use, audit, and understand. It allows you to create very readable configurations even for complex stateful firewalls. Sanewall can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers and servers, all kinds of NAT, providing strong protection (flooding, spoofing, etc.), transparent caches, source MAC verification, blacklists, and whitelists. Newer versions abstract the differences between IPv4 and IPv6, allowing you to define a common set of rules for both, while permitting specific rules for each as you need. Sanewall is a fork of FireHOL and can make use of existing FireHOL configurations.
jEncrypt is a commandline file encryption archiver. Files are encrypted with the AES-CTR mode, which was recommended by the National Institute of Standards and Technology in 2001 (NIST SP 800-38A). AES-CTR mode only provides confidentiality. It requires a message authentication code such as CBC-MAC to ensure an encrypted message is not accidentally modified or maliciously tampered with, which jEncrypt currently does not provide.
Whonix is an anonymous general-purpose operating system based on Virtual Box, Debian GNU/Linux, and Tor. By design, IP and DNS leaks are impossible. Not even malware with root rights can find out the user's real IP/location, because Whonix consists of two (virtual) machines. One machine solely runs Tor and acts as a gateway, called Whonix-Gateway. The other machine, Whonix-Workstation, is on a completely isolated network. Only connections through Tor are possible.
Dump Truck for Mac allows you to securely store, sync, and share all your photos, files, and documents online and access them anywhere. It doesn't rely on third parties to store your data or use data deduplication to inspect your data. The authors own their own storage infrastructure and store three copies of each file using 256-bit encryption. Android, iOS, and Windows apps are also available.
iptables-bash_completion provides programmable completion for the iptables and ip6tables programs. iptables options are shown only if they are valid at the current context. It supports completion of options, matches, and targets, and dynamic retrieval of data from the system, including chains, set names, interfaces, and hostnames. Environment variables allow completion options to be tuned. IP and MAC addresses can be supplied using a file.
"PHP Web Security Monitor" is designed to protect Internet sites created with PHP from malicious queries from hackers and Web viruses. It filters common PHP variables via prepared security patterns and compares (unprotected) input variables against patterns of dangerous data, such as SQL injection, XSS injection, and PHP code compromising.