RSS 168 projects tagged "Windows"

No download Website Updated 13 Apr 2014 PeaZip

Screenshot
Pop 1,018.38
Vit 220.40

PeaZip is a cross-platform file archiver utility that provides a unified portable GUI for many open source technologies like 7-Zip, FreeArc, PAQ, UPX, etc. Creates 7Z, ARC, BZ2, GZ, *PAQ, PEA, QUAD/BALZ, TAR, UPX, WIM, XZ, and ZIP files. It extracts more than 150 archive types: ACE, ARJ, CAB, DMG, ISO, LHA, RAR, UDF, ZIPX, and more. Features of PeaZip include extracting, creating, and converting multiple archives at once, creating self-extracting archives, split/join files, strong encryption with two factor authentication, an encrypted password manager, secure deletion, find duplicate files, calculate hashes, and export job definitions as scripts.

Download Website Updated 09 Apr 2014 Qccrypt

Screenshot
Pop 73.55
Vit 46.89

Qccrypt is a very small graphical frontend for the ccrypt encryption/decryption commandline program. The file to encrypt/decrypt can be passed as a parameter on the commandline.

Download No website Updated 03 Apr 2014 Diladele Web Safety

Screenshot
Pop 281.55
Vit 34.12

Diladele Web Safety is an ICAP server that integrates with an existing Squid proxy server and provides rich content and Web filtering functionality to sanitize Internet traffic passing into an internal home/enterprise network. It blocks pornography and explicit (adult) content by deep inspecting HTML content and URLs, blocks file downloads, performs filtering based on groups, controls Web usage by categories, removes annoying Web ads, and protects online privacy by disallowing access to Web trackers. It runs on any FreeBSD derived platform, RedHat, CentOS, Debian, and Ubuntu Linux, Raspberry PI, and Apple OS X, providing a comprehensive Web filtering solution easily manageable via a Web UI.

Download Website Updated 28 Mar 2014 LinOTP

Screenshot
Pop 882.96
Vit 39.32

LinOTP is a solution for strong two-factor authentication with one time passwords. It features a modular architecture into which UserIdResolver, authentication, and OTP calculation modules can be plugged. It includes UserIdResolver modules for LDAP/AD, SQL, and flat file user databases, and authentication modules for PAM and RADIUS. New modules can be developed easily. Supported tokens are HMAC-OTP/HOTP (RFC 4226/ OATH compliant), Aladdin eToken PASS, eToken NG-OTP, Safeword Alpine, Yubikey, Google Authenticator, motp, SMS OTP/Mobile TAN, email token, and a Simple Pass token for users without token hardware. TOTP is supported, along with a new algorithm for daily passwords for applications not supporting RADIUS. OCRA tokens are supported to allow transaction signing in banking environments. CLI, Web, and GTK+ GUI clients are available for management. LinOTP features multi-client capability, redundancy, and a self-service portal. It has been used with PAM for local and SSH logins, Apache, VPN, and Windows Terminal Server, and is OATH certified.

Download Website Updated 11 Mar 2014 SaluSafe

Screenshot
Pop 198.07
Vit 4.47

SaluSafe is an encrypted email, chat, and file storage and sharing system. Your email and files are highly encrypted end-to-end, and cannot be intercepted by any third party. It was built from the ground up for security via strong cryptography, and is not just another security wrapper on top of an existing email solution.

No download No website Updated 11 Feb 2014 txtorcon

Screenshot
Pop 110.20
Vit 6.00

txtorcon is a Twisted-based asynchronous Tor control protocol implementation. Twisted is an event-driven networking engine written in Python, and Tor is an onion-routing network designed to improve people’s privacy and security on the Internet. It includes unit-tests with 96%+ coverage, multiple examples, and documentation. There are abstractions to track Tor configuration and state (circuits, streams), launch private instances, support Hidden Service, and more.

Download Website Updated 28 Jan 2014 CERTivity KeyStores Manager

Screenshot
Pop 87.41
Vit 4.27

CERTivity is a powerful multi-platform visual tool for creating, managing, and handling different key store types (such as JKS, JCEKS, PKCS12, the Bouncy Castle types BKS and UBER, and Windows Native), public, private and secret keys in different formats (PKCS, OpenSSL, RSA/DSA, etc.), certificates (version 1 and 3), and certificates chains. It allows you to import and export keys, key pairs and certificates, manage certificate extensions, extend the validity period for self-signed certificates, test certificates, obtain revocation status, convert from one key store type to another, and much more.

Download Website Updated 18 Jan 2014 Disk ARchive

Screenshot
Pop 992.05
Vit 50.12

Dar is a shell command that makes backup of a directory tree and files. Its features include splitting archives over several files, DVD, CD, ZIP, or floppies, compression, full or differential backups, strong encryption, proper saving and restoration of hard links, extended attributes, file forks, Door inodes, and sparse files, remote backup using pipes and external commands (such as ssh), and rearrangement of the "slices" of an existing archive. It can run commands between slices, before and after saving some defined files or directories (for a proper database backup, for example), and quickly retrieve individual files from differential and full backups. Several external GUIs exist as alternatives to its CLI interface, like kdar, DarGUI, SaraB, etc.

Download Website Updated 04 Jan 2014 OVAL Interpreter

Screenshot
Pop 156.40
Vit 23.06

The OVAL Interpreter is a freely available reference implementation that demonstrates the evaluation of OVAL definitions. Based on a set of definitions, the interpreter collects system information, evaluates it, and generates a detailed OVAL results file.

Download Website Updated 24 Dec 2013 Tor

Screenshot
Pop 805.92
Vit 62.15

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Screenshot

Project Spotlight

NetXMS

A network monitoring and management system.

Screenshot

Project Spotlight

Buildes

A designer’s program for describing parts of the building.