RSS 286 projects tagged "Windows"

Download Website Updated 12 Sep 2009 CloudVPN

Screenshot
Pop 276.95
Vit 4.18

CloudVPN is a secure decentralized mesh networking tool. It allows applications to use it as a mesh transport layer for packet routing, easily creating mesh ethernet VPN, secured audio/video broadcasting or communication channels, etc. It can create secured networks with special or weird topologies, so it's very easy to create connection schemes with clustered/decentralized servers, topologies with better throughput, ring-like topologies for failover, long-line for passing through many routes, or tree topology for optimizing inter-server bandwidth needs.

No download Website Updated 10 Jan 2009 Passgen

Screenshot
Pop 26.15
Vit 1.00

Passgen is a simple program that generates passwords. It has a GUI that is well suited to all kinds of users.

Download Website Updated 23 Apr 2009 KeePassX

Screenshot
Pop 85.73
Vit 1.00

KeePassX is a password manager or or safe that helps you to manage your passwords in a secure way. You can put all your passwords in one database, which is locked with one master key or a key-disk. You only have to remember one single master password or insert the key-disk to unlock the whole database. The databases are encrypted using AES or Twofish.

Download No website Updated 21 Apr 2009 Bukowski Framework

Screenshot
Pop 17.41
Vit 1.41

Bukowski Framework is intended to demonstrate that current popular approaches to software security (e.g. DAC, VMA randomization, anti-virus, NIDS, etc.) are not sufficient and that other approaches should be considered more seriously (e.g. MAC, design by contract, mutual authentication/authorization, etc.).

Download No website Updated 07 Jul 2009 Security Filter for Request HTTP Data

Screenshot
Pop 24.41
Vit 1.01

Security Filter for Request Data is a script that can filter SQL injection/XSS/cross-site requests, hex code, and some popular injection commands. By default, it filters $_GET, $_POST, $_COOKIE, and $_REQUEST. Simply include it in the headers of your site files.

Download Website Updated 06 Oct 2009 Ozirion

Screenshot
Pop 51.09
Vit 2.07

Ozirion is an experimental Web browser allowing people and groups to improve their privacy on the Internet by hiding their IP address through a network of virtual tunnels. The current release of Ozirion relies on the Tor technology. It includes a built-in Tor server and provides the ability to choose or ban countries in order to use an IP address from a specific country. The Privoxy local proxy is used for better privacy. Ozirion is totally independent from the Tor and Privoxy projects.

Download Website Updated 09 Mar 2010 geoipgen

Screenshot
Pop 43.37
Vit 1.53

geoipgen is an IP network tool for generating geotargeted lists of IP addresses using MaxMind's GeoLite Country database. It can randomly enumerate all IP addresses or a specified number of IP addresses in a particular country or a list of countries. For example, to get all IPs for Japan in a random order, use "geoipgen jp". For a sample of 10,000 IPs from Australia and New Zealand, use "geoipgen -n 10000 au nz".

No download Website Updated 03 Mar 2011 RedWolf Security Threat Generator

Screenshot
Pop 141.70
Vit 2.47

RedWolf is a security threat simulator that tests security system effectiveness. Its threat generation capabilities include email, IM, malware, P2P, social networking, VoIP, DDoS, and many more. The guiding philosophy is that by generating realistic scenarios in a wide variety of categories, an auditor or organization can assess the effectiveness of network defenses. The scenario suite allows one to verify compliance with PCI-DSS, Sarbanes-Oxley, or HIPAA controls. RedWolf helps identify data loss risks and provides expert recommendations concerning risk mitigation. It reports present findings, recommendations, best practices, and blocking guidance in a straightforward, easily readable format. RedWolf also acts as a 'Red Team' agent, running drills to measure the readiness of your operations staff.

No download Website Updated 17 Feb 2014 MQ Authenticate User Security Exit

Screenshot
Pop 59.43
Vit 5.51

MQ Authenticate User Security Exit (MQAUSX) is a solution that allows a company to fully authenticate a user who is accessing a WebSphere MQ resource. It verifies the user's user ID and password (and possibly domain name) against the server's native OS system (or domain controller) or a remote LDAP server. The security exit will operate with WebSphere MQ v6.0, v7.0, v7.1, or v7.5 in Windows, iSeries (OS/400), Unix, and Linux environments. It works with Server Connection, Client Connection, Sender, Receiver, Server, Requestor, Cluster-Sender, and Cluster-Receiver channels of WebSphere MQ queue manager. The MQ Authenticate User Security Exit solution is comprised of 2 components: client-side security exit and server-side security exit.

No download Website Updated 17 Feb 2014 MQ Channel Encryption

Screenshot
Pop 32.47
Vit 4.80

MQ Channel Encryption (MQCE) is a solution that provides AES encryption for message data flowing between WebSphere MQ (WMQ) resources. It operates with Sender, Receiver, Server, Requestor, Cluster-Sender, Cluster-Receiver, Server Connection, and Client Connection channels of the WMQ queue managers. It is a simple drop-in solution and can be configured as a queue manager channel message exit or as a channel sender/receive exit pair.

Screenshot

Project Spotlight

wro4j

A Web resource optimizer for Java.

Screenshot

Project Spotlight

doclifter

man/mandoc/ms/me/mm-to-DocBook document transcoding.