Advertisements
 
 Advertisements
musicappsios sportsappsios wargamesios

Security systems

Cyphx  Cyphx

 You can increase and enhance the security measures of your website and its content from hackers and frauds by encrypting the files. This multiplatform script can also be used as a stand alone application from your desktop to encrypt and decrypt all your web contents. This program can encrypt all smaller cases of your text files efficiently....

Securum  Securum

 An encrypted im/email client/server application using custom encryption algorhythms written for secure communcations over networks. Very Simple interface. NOTE: You must also have wxPython installed for gui interface....
Tags:

Cyphx - Python Version. Encipher and Decipher texts  Cyphx - Python Version. Encipher and Decipher texts

 Based on a formerly javascript program, it is useful to encipher and decipher text files. Written in Python, has now a multiplatform gui (Tkinter) that let users to try it as a standalone program. It`s provided as is, and is free....

Mnemonic Password Generator  Mnemonic Password Generator

 An mnemonic password generator module with an optional command line interface and two GUIs in Tkinter and wxPython....

VIFF: Virtual Ideal Functionality Framework  VIFF: Virtual Ideal Functionality Framework

 Virtual Ideal Functionality Framework is a framework for creating efficient and secure multi-party computations (SMPC). Players, who do not trust each other, participate in a joint computation based on their private inputs. The computation is done using a cryptographic protocol which allows them to obtain a correct answer without revealing their inputs -- even if some players try to cheat by deviating from the protocol. Operations supported include addition, multiplication, and comparison, all with Shamir secret shared outputs....
Tags:

ICMP Knock Server  ICMP Knock Server

 This program uses a concept similar to port knocking, which basically involves waiting for a range of packets that match given criteria before executing some action (typically exposing a port, e.g. for SSH connections, that is kept closed or blocked otherwise). But instead of listening for TCP or UDP packets to arrive on specific ports in a specific order, it accepts ICMP echo requests and checks if their payload lengths and order of arrival match the given pattern. The advantage is that this approach works with the standard PING tool. Programs with custom code or (although common) networking tools like netcat plus the ability to execute them are not required....

 

 

Pages :  1