You are here: ITNiki >Java>Applications>Security

 
 Advertisements
 
 Advertisements
wargamesios wordgamesios android appcolt

Security

LockPic  LockPic

 LockPic disables a web visitors ability to save your valuable online content, such as .jpg and .gif files, to their local computers. LockPic has an easy to use interface, which allows you to design the entire web page from one location. LockPic allows you to configure protection for multiple images simultaneously, as well as create thumbnails, copyright marking, watermarks, and http links in easy single click steps. LockPic is currently available as free trial beta....

Java File Integrity Checking - ChkSum  Java File Integrity Checking - ChkSum

 A similar to Tripwire, file system integrity checking tool but develop in java and cross platform. This tools checking and source control using check sum algorithm like MD5, SHA and CRC. It provide generate current file integiry checksum record to compare....
Tags:

Java Proxy  Java Proxy

 Java Proxy lets you access computers behind a firewall. It includes Socks and Web proxy as a user program interface. Also includes functions for secure connections between two computers, as well as simple Web server with HTTPS support....

Password Manager  Password Manager

 Keep all your account information with user id,password,url and notes information in one place. With PasswordManager, you can organize passwords in multiple files. Data files will be encrypted. Each and every file has to be assigned with a password which will be asked when the file is open for viewing/editing. You can choose to store any personal data which can be stored in tabular form. This also includes a flexible and configurable random password generator....

SMSAuthenticator  SMSAuthenticator

 SMSAuthenticator is an authentication module for situations where "username and password"-login provide insufficient security. Additional security is achieved by sending keys by SMS to the user`s mobile phone. The user must return a correct single-use password within a certain timeframe, in order to be authenticated successfully. Only a GSM device capable of showing SMS messages is required on the user end. SMSAuthenticator is a Java-based web service component, and may be integrated into any application capable of accessing SOAP services. It has a Web-based administration interface for managing user accounts, and also generates pronouncable passwords according to the FIPS 181 standard....
Tags:

SSC Encryption Free Program and Source  SSC Encryption Free Program and Source

 This is a simple example of how to use java to encrypt strings. Best used for learning purposes, source code and class files available for download....

LockCrypt  LockCrypt

 LockCrypt is an easy to use database to guard your personal details. It offers a central location to manage your website passwords, accounts, contacts, credit cards and other sensitive data. LockCrypt includes a password generator to create passwords, and can export to CSV, XML or plain text files. It can also import from XML. Accounts can be sorted in to groups and assigned an icon to make them easier to find. Drag and drop is supported, as well as MySQL and flat file database support. LockCrypt uses AES encryption to protect the details you enter. This is regarded by the cryptography industry to be virtually unbreakable. There`s also a mobile version of LockCrypt which runs on any J2ME capable device, allowing you to take your accounts database with you on the move. LockCrypt`s Secure Clipboard protects any details you copy to the clipboard through the program, and Native translations into Czech, German and others are also available....

reckon i  reckon i

 reckon i is compiled with iTweak , iThreat , iProtect and iUtil . Each have different functions of their own. iTweak is a component where we fix problems that I just stated above. iThreat is a component to remove the malware/viruses (it works similar like RemoveIT accept you have to add your own virus signature), iProtect is to protect special folders or files from being accessed by unwanted user. Last but not least, the iUtil is used to run some of the Windows tweaking tools such as Regedit, Command Prompt, Defragmenter, etc. Sometimes, malware disabled "RUN", hence makes it hard to open Command Prompt, and here the iUtil really comes in handy....
Tags:

 

 

Pages :  1