|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FIRST <<< | PREV < | Showing items 166 to 180 | > NEXT | >>> LAST |
| SW Name | Home page | Downloaded |
|---|---|---|
| rccrypt | http://www.ricksoft.co.uk/[..]t/rccrypt.htm | 2024x |
| RC-Crypt keeps your data safe. It is an easy to use command line program that encrypts your data. | ||
|
|
GnuPG.pm | http://indev.insu.com/GnuPG/ | 2023x |
| The GnuPG perl module interfaces with the Gnu Privacy Guard using the coprocess hooks provided by gpg. | ||
|
|
squidefender | http://www.jeroen.se/[..]idefender.php | 2022x |
| Squidefender is a perl script which parses a squid log file in native format for attacks. | ||
|
|
pam_ccreds | http://www.padl.com/[..]m_ccreds.html | 2022x |
| The pam_ccreds module provides the means for Linux workstations to locally authenticate using an enterprise identity when the network is unavailable. | ||
|
|
ip-masq-log | http://www.cli.di.unipi.it/[..]zunino/linux/ | 2021x |
| This patch can be used on a masquerading firewall (NAT) to keep a log of all the outgoing masqueraded TCP connections. | ||
|
|
Makejail | http://www.floc.net/makejail/ | 2017x |
| Makejail employs short configuration files to help administrators create and maintain chroot jails. | ||
|
|
LinVPN | http://mrtg.planetmirror.com/pub/linvpn/ | 2016x |
| LinVPN allows you to create a VPN (Virtual Private Network) from linux to linux. Normally both are gateways of a LAN, then the LANs behind them may access each other over an encrypted tunnel created by the software. | ||
|
|
Keychain | http://www.gentoo.org/[..]ain/index.xml | 2014x |
| The keychain script makes handling RSA and DSA keys both convenient and secure. | ||
|
|
fcatalog | http://fcatalog.lupine.org/ | 2013x |
| fcatalog is a program for identifying the origins of files. Though its operation is similar to the operation of file-checksum-checking security utilities (like tripwire), its purpose and methodology is different. | ||
|
|
TEA Total | http://www.linuxhacker.org/tea-total/ | 2013x |
| TEA Total is a very small 128 bit private key based encryption/decryption system which uses the block variant of TEA (Tiny Encryption Algorithm) | ||
|
|
CODEX | http://www.umiacs.umd.edu/[..]mmarsh/CODEX/ | 2004x |
| CODEX is designed for applications with a moderate number of clients (tens or hundreds) requesting keys that change often but not continuously (on the scale of minutes to hours). | ||
|
|
authd_ | http://69.56.132.179/~ury/ | 2004x |
| authd_ is an auth daemon for Linux. It operates without using the SUID bit on executables, and it supports the PAM and NSS interfaces, /etc/passwd, /etc/shadow, and MySQL for storing user information. | ||
|
|
Tunnel Vision | http://open.nit.ca/[..]=TunnelVision | 2002x |
| TunnelVision creates an encrypted VirtualPrivateNetwork, or VPN, between two Tunnel Vision-capable sites on the Internet. | ||
|
|
NuFW | http://www.nufw.org/[..].php3?lang=en | 2001x |
| NuFW is an enterprise grade firewall that performs an authentication of every single connection passing through the IP filter, by transparently requesting user’s credentials before any filtering decision is taken. | ||
|
|
Horatio: Authenticated Network Access | http://www.cs.utexas.edu/[..]ware/horatio/ | 2001x |
| The Horatio system is a firewall authentication tool. The premise: legitimate users want to attach laptops and other mobile hosts to the network, but security demands that illegitimate users be prevented from accessing the internal, secure network and from abusing the general Internet. The approach taken by Horatio is to provide a separate, untrusted network that only connects to the internal network (and thus to the Internet) through a firewall that by default does not pass any traffic. The user must point a Web browser at the Horatio web server, which runs on the firewall machine, and provide a username and password. | ||
|
|
||
| FIRST <<< | PREV < | Showing items 166 to 180 | > NEXT | >>> LAST |
| 1. |
Pacman linux Download: 5892x |
| 2. |
FreeBSD Download: 10110x |
| 3. |
PCLinuxOS-2010 Download: 9592x |
| 4. |
alcolix Download: 12218x |
| 5. |
Onebase Linux Download: 10976x |
| 6. |
Novell Linux Desktop Download: 0x |
| 7. |
KateOS Download: 7336x |
| 1. |
xinetd Download: 3555x |
| 2. |
RDGS Download: 937x |
| 3. |
spkg Download: 6609x |
| 4. |
LinPacker Download: 11836x |
| 5. |
VFU File Manager Download: 4039x |
| 6. |
LeftHand Mała Księgowość Download: 8415x |
| 7. |
MISU pyFotoResize Download: 3766x |
| 8. |
Lefthand CRM Download: 4581x |
| 9. |
MetadataExtractor Download: 0x |
| 10. |
RCP100 Download: 4142x |
| 11. |
Predaj softveru Download: 0x |
| 12. |
MSH Free Autoresponder Download: 0x |
linuxsoft.cz
| Design: www.megadesign.cz