RSS 1966 projects tagged "Security"

Download Website Updated 28 Aug 2013 MUNGE Uid 'N' Gid Emporium

Screenshot
Pop 60.00
Vit 9.63

MUNGE (MUNGE Uid 'N' Gid Emporium) is an authentication service for creating and validating credentials. It is designed to be highly scalable for use in an HPC cluster environment. It allows a process to authenticate the UID and GID of another local or remote process within a group of hosts having common users and groups. These hosts form a security realm that is defined by a shared cryptographic key. Clients within this security realm can create and validate credentials without the use of root privileges, reserved ports, or platform-specific methods.

No download Website Updated 23 Apr 2007 MUTE File Sharing

Screenshot
Pop 98.71
Vit 3.64

MUTE File Sharing is an anonymous, decentralized search-and-download file sharing system. Several people have described MUTE as the "third generation file sharing network" (From Napster to Gnutella to MUTE, with each generation getting less centralized and more anonymous). MUTE uses algorithms inspired by ant behavior to route all messages, include file transfers, through a mesh network of neighbor connections.

No download Website Updated 06 Apr 2013 MaheshaOpenBSD Server

Screenshot
Pop 17.83
Vit 19.56

MaheshaOpenBSD Server is a turnkey WordPress/FTP/Apache OpenBSD server designed to run from a USB flash drive. The file system is writable. phpMyAdmin is included. For additional FTP storage, you can mount another disk. Users can easily install additional packages.

No download Website Updated 21 Jun 2012 MailCleaner

Screenshot
Pop 94.60
Vit 5.37

MailCleaner is an anti-spam/anti-virus SMTP gateway with user and admin Web interfaces, a quarantine system, and support for multiple domains, templates, and languages. It's based on Debian and uses Bayes, RBLs, Spamassassin, MailScanner, and ClamAV.

Download Website Updated 24 Sep 2004 MailRecon

Screenshot
Pop 15.68
Vit 59.14

MailRecon is a passive POP3 and SMTP email content control application. It captures email messages from network traffic, analyzes messages with the help of an external filter, and performs some actions according to the verdict from the filter.

No download Website Updated 12 Jul 2003 MailSleuth Email Management Package

Screenshot
Pop 8.66
Vit 1.00

Mailsleuth is an email content management system. It is intended that one day it may match the features of commercial products such as MimeSweeper from Baltimore. It is designed for large companies or Service Providers.

No download Website Updated 17 Sep 2007 MailStripper Pro

Screenshot
Pop 79.82
Vit 7.28

MailStripper Pro is a mail scanner that aims to remove spam and viruses from incoming mail. It recognises and decodes many obfuscation techniques used by spammers and uses several different mechanisms to recognise spam which are immune to Bayes poisoning, and has achieved real-world success of over 99.8%. It is MTA-independent and does not implant itself into your mail server. Instead, it functions as a proxy, allowing the MTA to reside on a different server.

Download Website Updated 30 Sep 2002 Mailcrypt

Screenshot
Pop 43.37
Vit 3.71

Mailcrypt is an Emacs Lisp package which provides a simple interface to public key cryptography with PGP/GPG. Mailcrypt makes strong cryptography a fully integrated part of your normal mail and news handling environment.

Download Website Updated 26 Feb 2002 Makejail

Screenshot
Pop 20.74
Vit 66.62

Makejail employs short configuration files to help administrators create and maintain chroot jails. Makejails attempts to guess which files are required by the daemon, and installs all these files into the jail.

Download Website Updated 25 Dec 2013 Malheur

Screenshot
Pop 109.16
Vit 11.51

Malheur is a tool for the automatic analysis of malware behavior (program behavior recorded from malicious software in a sandbox environment). It is designed to support the regular analysis of malicious software and the development of detection and defense measures. It allows for identifying novel classes of malware with similar behavior and assigning unknown malware to discovered classes. It can be applied to recorded program behavior of various formats as long as monitored events are separated by delimiter symbols, e.g. as in reports generated by the popular malware sandboxes CWSandbox, Anubis, Norman Sandbox, and Joebox.

Screenshot

Project Spotlight

JustSort

A simple application for sorting data in your browser.

Screenshot

Project Spotlight

Quenlig

An online interactive tutorial and free text assesments.