RSS 99 projects tagged "Windows"

Download Website Updated 11 Apr 2011 ACL2

Screenshot
Pop 74.94
Vit 4.97

ACL2 is a mathematical logic, programming language, and mechanical theorem prover based on the applicative subset of Common Lisp. It is an "industrial-strength" version of the NQTHM or Boyer/Moore theorem prover, and has been used for the formal verification of commercial microprocessors, the Java Virtual Machine, interesting algorithms, and so forth.

Download Website Updated 14 Apr 2004 Akeni Jabber Client

Screenshot
Pop 38.42
Vit 1.48

Akeni Messenger Jabber Edition is a cross-platform client for Jabber compliant servers. It features an XML-based messaging protocol, private chatting, conference mode, broadcast messages to groups of people, message log, a typing indicator, a full-featured rich-text editor, emoticons, and powerful online presence management.

No download Website Updated 20 Jan 2006 Aradial RADIUS server

Screenshot
Pop 28.86
Vit 1.00

Aradial RADIUS Server is a high performance RADIUS server with Tier 1 levels of reliability and scalability. It supports the latest RFCs, vendor specific attributes, and NAS templates, and has a multitude of pre-configured settings that support most access servers on the market today. It is based on a plugin architecture, which allows customization of the authentication and accounting logic outside of the core product. It is integrated with top billing solutions for ISP, WISP, Wifi, Hotspots, and VoIP.

Download Website Updated 17 Sep 2003 Bugs Dynamic Cryptography

Screenshot
Pop 17.23
Vit 1.00

Bugs Dynamic Cryptography is a private key cryptography algorithm. The package includes a C Library and many sample applications, including ones for file encryption, secure chatting, and login applications. The algorithm handles stream and block encryption, unlimited Keylength, and a strong key generator. Documentation and a developer HOWTO are included.

No download Website Updated 11 Aug 2005 Burp spider

Screenshot
Pop 34.47
Vit 1.87

Burp spider is a tool for enumerating Web-enabled applications. It uses various intelligent techniques to generate a comprehensive inventory of an application's content and functionality. Key features include parsers for HTML and JavaScript, presentation of findings in tree and table formats, handling of HTML forms with automatic or user-guided form submission, authentication to protected areas of the application using supplied credentials, cookie processing, detection of custom "not found" responses, fine-grained scope control, SSL support, identification of dynamic "application" pages which use data parameters or are session-dependent, and IDS evasion techniques.

No download Website Updated 18 Dec 2007 Burp suite

Screenshot
Pop 35.89
Vit 1.66

Burp suite allows an attacker to combine manual and automated techniques to enumerate, analyse, attack, and exploit Web applications. The various burp tools work together effectively to share information and allow findings identified within one tool to form the basis of an attack using another. Numerous interfaces are implemented between the different tools, designed to facilitate and speed up the process of attacking a Web application. All tools share the same robust framework for handling HTTP requests, authentication, downstream proxies, logging, alerting, and extensibility. Burp suite is extensible via the IBurpExtender interface.

Download Website Updated 13 Dec 2001 CDSA 2

Screenshot
Pop 40.42
Vit 1.49

CDSA stands for Common Data Security Architecture. It provides a security framework that includes cryptographically signed modules to present an abstracted unified API to the application developer to perform cryptographic and security related operations. It also includes hardware support for cryptographic tokens and biometric devices, such as thumbprint scanners. Intel has implemented the CDSA 2 specification and released it as open source.

No download Website Updated 17 Sep 2003 CyberFusion

Screenshot
Pop 13.71
Vit 62.18

CyberFusion is a system that provides secure file transfer across a LAN, a WAN, and the Internet. It offers encryption and security, reliability and guaranteed delivery, management and automation, audit and control. It offers cost-saving migration from competitor products such as Connect:Direct which is supported with useful tools. It may be used as part of a VPN, ERP, EAI, or ETL software solution for secure file transfers as well as in disaster recovery, data archive, and backup and restore operations.

Download Website Updated 26 Sep 2004 Cyfer

Screenshot
Pop 26.83
Vit 1.00

Cyfer is a portable modular low-level cryptographic library with support for several programming languages. It provides implementations of message digest (hash), block and stream cipher, and public-key algorithms.

Download Website Updated 04 Jun 2004 DB_eSession

Screenshot
Pop 51.09
Vit 1.42

DB_eSession is a feature-packed PHP class that stores session data in a MySQL database rather than files. It is powerful, designed with security in mind, and is easy to utilize. The code contains lots of comments, and it comes with full documentation and examples of how to use the class including a basic authentication login/logout process. It includes member functions useful (to webmasters) for monitoring or viewing, deleting, and altering sessions validity for the case of locking one or more sessions upon detection of unauthorized use.

Screenshot

Project Spotlight

MyNewspaper

A Web-based personal RSS/ATOM news aggregator and feeds reader.

Screenshot

Project Spotlight

S3QL

A full featured file system for Amazon S3 and other online storage services.