Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).
PeaZip is a cross-platform file archiver utility that provides a unified portable GUI for many open source technologies like 7-Zip, FreeArc, PAQ, UPX, etc. Creates 7Z, ARC, BZ2, GZ, *PAQ, PEA, QUAD/BALZ, TAR, UPX, WIM, XZ, and ZIP files. It extracts more than 150 archive types: ACE, ARJ, CAB, DMG, ISO, LHA, RAR, UDF, ZIPX, and more. Features of PeaZip include extracting, creating, and converting multiple archives at once, creating self-extracting archives, split/join files, strong encryption with two factor authentication, an encrypted password manager, secure deletion, find duplicate files, calculate hashes, and export job definitions as scripts.
P-Synch is a commercial password management toolkit which provides automated password synchronization, password strength enforcement, password self-reset by authenticated users, and streamlined password reset by helpdesk. P-Synch is available for both internal use as well as for Internet-based deployments in B2B and B2C applications.
SecurityFocus ARIS Extractor is a sophisticated Intrusion Detection System (IDS) log analyzer and reporting system, integrated with the SecurityFocus ARIS web site. It allows administrators to upload Intrusion Detection System (IDS) logs to the SecurityFocus ARIS Web site, producing sophisticated reporting, and research attacks and events. By filtering out insignificant or benign data and converting it to a common (XML) format, ARIS extractor streamlines incident reporting for both security professionals and home users, allowing IDS operators to focus only on relevant attacks and incidents. It allows you to analyze and archive logged incidents, cross reference incidents/attacks with the SecurityFocus Vulnerability Database, look up contact information for offending IP addresses, generate personal incident statistics and reports, automatically identify and report important incidents, reduce the amount of time spent parsing IDS logs, and generate daily summary reports, delivered by email (optional). All of this is done without revealing any information that could be used to discern your identity. It can be configured to obfuscate IP addresses, names, and other pertinent details before submitting them to the ARIS Analyzer web site. It supports Snort, Cisco Secure IDS, Dragon, NetProwler, RealSecure, BlackICE Defender, and ICEPac.
Hiawatha is a secure and advanced Web server for Unix. It has been written with security as its main goal. It features advanced access control, prevention of SQL injection and cross-site scripting, banning of clients who try such exploits, the ability to run CGIs under any UID/GID you want, and many other features. These features make Hiawatha an interesting Web server for those who need more security than what the other available Web servers are offering. Hiawatha is also fast and easy to configure.
OpenXAdES enables people to work with legally-binding digital signatures (primarily giving and verifying them). Legislation often defines a set of requirements that legal digital signature technologies and infrastructures must be compliant with, and OpenXAdES aims at meeting many, if not all, such requirements from different legislations.
CyberFusion is a system that provides secure file transfer across a LAN, a WAN, and the Internet. It offers encryption and security, reliability and guaranteed delivery, management and automation, audit and control. It offers cost-saving migration from competitor products such as Connect:Direct which is supported with useful tools. It may be used as part of a VPN, ERP, EAI, or ETL software solution for secure file transfers as well as in disaster recovery, data archive, and backup and restore operations.