Software Index
Popular Trends
Trending Topics
Linux Software Security Tools  

Security Tools

Records 141-160 of 251  |  Go to << Prior 1 ... 4 5 6 7 8 9 10 11 12 13 Next >> page 
Product Title  /  Popularity Revised  License Rating Size
Snort Config
Snort Config provides an intuitive menu-based interface for the GPL IDS tool Snort.

SnortConf is a tool that provides a fairly intuitive menu-based text interface for setting up the GPL IDS tool Snort. It also provides error and sanity checking on ...
May 11th 2011 Freeware    143k
PAM Lockout Module
PAM Lockout Module is a PAM module is used to lockout users or groups from access to the machine. The module only supports authentication queries and the command line arguments are used to pass the users and groups.

A sample usage ...
May 10th 2011 Freeware    307k
K-EncFS is a frontend to the EncFS encrypting utility.

If you have a notebook, or personal data on your computer, you really need this application.

Encfs is meant to provide security against off-line attacks; ie your notebook is stolen, your backups are ...
May 9th 2011 Freeware    184k
Password Drill
Password Drill is a tool enables a user to make use of passwords of ideal complexity and obscurity without being temped to write them down. By combining practically unbreakable cryptography with easy flashcard-style review, pwdrill reinforces and confirms a user's ...
May 9th 2011 Freeware    20k
Mobius Forensic Toolkit
Mobius Forensic Toolkit is an open-source set of forensic tools written in Python/GTK. It is application centered instead of being file centered, which means it gathers information throughout evidence disks and directories and shows it in an integrated way. Mobius ...
May 7th 2011 Freeware    612k
Perso can handle different types of identity card numbers (e. g. german/ austrian ID-card and passport).

It check the numbers for correctness using the "7-3-1"-checksum algorithm. Also it can extract information from the numbers (e. g. birthday) or generate example numbers ...
May 7th 2011 Freeware    20k
PlexCrypt is a smart software that protects documents and folders based on both asynchronous encryption based on Public-Key-Infrastructure (PKI) and synchronous encryption based on passwords. The encryption uses secured algorithms such as AES, Blowfish, CAST, DES, ElGamal, IDEA, IES, RC4, ...
May 6th 2011 Shareware    41,994k
IPS HLBR program is a fork of the Hogwash project. It is an IPS (Intrusion Prevention System) that can filter packets directly in layer 2 of the OSI model (so the machine doesn't need an IP address).

Detection of malicious/anomalous traffic ...
May 5th 2011 Freeware    184k
J2SSH provides a fully-featured Java SSH version 2 API implementation.

J2SSH is an object-orientated Java implementation of the SSH version 2 protocol. It provides a rich, powerful, and extensible SSH API that enables developers to gain access to SSH servers and ...
May 4th 2011 Freeware    2,427k
These are some testing utilities that I put together to help in my development of TFTPgrab.

There weren't many good, simple TFTP servers/clients available in Ruby (or other scripting language) that implemented the full TFTP RFC specifications.. . Research. Demonstrations. ...
May 3rd 2011 Freeware    102k
Nilsimsa is a program that computes a locality-sensitive hash of a message.. .
May 3rd 2011 Freeware    51k
Kryptor is a graphical tool to encrypt files using the algorithm ARCS. Kryptor is also possible to erase files by overwriting data with a pseudo-random sequence of bytes iterated three times, which will make data recovery a very complex operation.. ...
April 27th 2011 Freeware    594k
PinePgp is set of display and sending filters which enables pine to send and receive signed and/or encrypted e-mails.

Supported are PGP (version 2.6.x, 5.x and 6.5.x) and GnuPG (version 1.0.0 and later).

First, you need some UNIX system which have 'sed' ...
April 26th 2011 Freeware    41k
Tiger Envelopes
Tiger Envelopes is an easy way to get your email privacy back.

With Tiger Envelopes you use email just like you always have with everyone. And, without you doing anything, your messages are private with people who use envelopes.

The mission of ...
April 26th 2011 Freeware    52,623k
gskey is an MD5 hash generator used to authorize on some proxy servers.. . Publisher of gskey, Author of gskey 2.0. gskey is an MD5 hash generator used to authorize on some proxy servers.
April 26th 2011 Freeware    262k
CyaSSL package is a fast, dual-licensed implementation of SSL for embedded and small footprint devices. It includes SSL client libraries and an SSL server implementation.

CyaSSL supports multiple APIs including an OpenSSL compatibility interface. TLS 1.1 is supported along with cipher ...
April 26th 2011 Freeware    727k
Tkccrypt project is a simple frontend for editing small text files encrypted with Peter Selinger's ccrypt.. . Publisher of Tkccrypt, Author of Tkccrypt 1.0. Tkccrypt project is a simple frontend for editing small text files encrypted with Peter Selingers ccrypt.
April 24th 2011 Freeware    20k
Shadow for Linux
Shadow is an easy-to-use application that has the possibility to encode/decode everything and anything that fits on/in your Hard Disk Drive.

You can encode texts, pictures, movies, music, applications ... so on.. . Publisher of Shadow for Linux, Author of Shadow ...
April 21st 2011 Freeware    113k
Kgpg is a frontend for GNU Privacy Guard (GnuPG). The project provides file encryption, file decryption and key management.

Here are some key features of "Kgpg":

an editor mode for easily and quickly encrypting or decrypting a file or message which ...
April 21st 2011 Freeware    13,322k
Avira AntiVir UNIX Server
Avira AntiVir UNIX Server is a VB100 % award-winning antivirus solution for Linux file servers with a real-time scanner and multifunctional performance features, designed to ensure complete protection against viruses and unwanted network programs. Uncompromising protection: - Leading detection and ...
April 19th 2011 Shareware    37,274k
New Software
Popular Software
Latest Reviews