Open Source C Security Software - Page 16

C Security Software

View 4764 business solutions

Browse free open source C Security Software and projects below. Use the toggles on the left to filter open source C Security Software by OS, license, language, programming language, and project status.

  • Simply Powerful Maintenance Management Software Icon
    Simply Powerful Maintenance Management Software

    CMMS helps you Schedule and Track everything in your facility

    Maintenance Care is a full-featured CMMS (computerized maintenance management system) offers preventive maintenance, asset tracking, document storage, reporting dashboards, numerous integrations and even more features designed to help you maintain the health and standards of every facility under your umbrella. Anyone can learn and begin using our CMMS with ease — no tech experience is required.
  • Optimize every aspect of hiring with Greenhouse Recruiting Icon
    What’s next for many of us is changing. Your company’s ability to hire great talent is as important as ever – so you’ll be ready for whatever’s ahead. Whether you need to scale your team quickly or improve your hiring process, Greenhouse gives you the right technology, know-how and support to take on what’s next.
  • 1
    SD4L is a suite of Linux tools including a graphical user interface which allow the creation of, and access to ScramDisk as well as TrueCrypt encrypted container files. In particular, SD4L provides a Linux driver which enables mounting of containers.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    Secure Storage service is a set of tools to store in a secure way and in an encrypted format confidential data on the grid storage elements. The service has been designed for the grid Middleware of the EGEE infrastructure, gLite.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    The CRY utility provides the ability to perform AES-256 symmetric key encryption of files. This is a light weight Linux utility and does not depend on PKI infrastructure. Rather, pre-shared encryption keys are used to protect your files.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    SimpleDriveWiper is a very simple command line tool that allows you to wipe the free space of a drive/partition. Its purpose is to obfuscate the residual of data that remains even after attempts have been made to remove it. For Windows,Linux and Mac.
    Downloads: 1 This Week
    Last Update:
    See Project
  • R3 Contract Management for GovCon Icon
    R3 Contract Management for GovCon

    Designed to meet the unique needs of Federal Government Contractors.

    R3 Contract Management for GovCon is a practical, flexible, and affordable software solution designed specifically for small to mid-size Federal Government Contractors. It provides you with a centralized contract management system. This gives you greater control over your contracts, reduces risks, increases your effectiveness and provides you with cost savings from increased productivity.
  • 5
    Slogger is a session keystroke logging utility. The goal of the design is to provide the same features available in many commercial products, but under the GNU license.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    This program will encrypt files. read more about it in the Readme. It incorporates AES256, Serpent, and Twofish. Please comment if you wish to see new features and I will see what I can do. Now has Blowfish Encryption. Now rewritten and imporved on.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    UnderMP3Cover is a mp3 steganography tool. It will allow you to write and read hidden messages within mp3 files without creating any audible differences to the mp3. The messages could be a text file, jpg or any other file depending on the mp3's size.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    X Test - An 802.1x Supplicant test tool for IP Phone / VoIP Infrastructure environments.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    stands for Active Integrity Software, provide quick alert of elf file modifications. Based on Gnu/Linux OS, with a daemon to analyse datas give by the kernel module, written in C.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Valant Behavioral Health EHR Icon
    Valant Behavioral Health EHR

    EHR Software for Mental Health Practices

    Unlike other non-specialized EMR software, Valant is built exclusively for behavioral health. It is designed to increase the administrative and clinical efficiency of your practice and includes built-in outcome measures, billing, reporting, telehealth, and clinical documentation tools – all tailored to the unique needs of mental health.
  • 10
    A daemon for detecting ARP spoofing (sometimes called "poisoning") on a network & alerting appropriately.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    A command line tool to create secure encrypted file using private key. You must provide key string to convert you source file into ecrypted one.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    Crypto.mod is a simple LOADABLE cryptographic module for tcl 8.3+ (possibly older, not tested). The module supports the blowfish, twofish and rijndael ciphers.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    “garuda” is an intrusion detection system against wireless threats. It is a progressive proof of concept project to ward off wireless threats such as war-drivers, rogue AP, wifi DoS and MAC spoofing attacks. Please enjoy and we welcome your volunteerism.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    gpkcs11 is an free implementation of the PKCS#11 Interface standard for cryptographics token. It includes one software-only token and will aid in writing support for hardware token. It also includes a test suite that will be extended to serve as a compreh
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    iptables managing tool. use gtk+/gnome and glade. rule manager can help to manage a rule.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    iDVR (formerly Devolution Security System) is a video surveillance system which can handle up to 16 cameras with motion detection, notification and record on motion to mp4. Stream over the LAN (Multicast) or Over the Net (Unicast).
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17
    Linvpn is a secure socket layer for pppd(8). For more information go to http://linvpn.sourceforge.net
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    mod_auth_oid

    mod_auth_oid

    OpenID relying party for Apache httpd

    mod_auth_oid is an Apache module allowing user authentication using OpenID 2.0.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    myPGP is an experimental PGP clone. It can be used to encrypt, decrypt and sign messages in a public key system, as well as to manage the keyrings. It's main goal is to fully implement the standard OpenPGP.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    OODDSS is a system that provide digital signature and verification for ELF executables and libraries in GNU/Linux systems. The goal is to be fast, transparent for the user and simple to administer and distribute the signed packages.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 21
    libpal is an easy-to-use, straightforward packet assembly library that allows programmers to forge any kind of IP, TCP, UDP, ICMP and application layer packages.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22
    Python wrapper around a small subset of the OpenSSL library. Includes: X509 Certificates, SSL Context objects, SSL Connection objects using Python sockets as transport layer. The Connection object wraps all the socket methods and can therefore be use
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23
    rjudge is a judge system for the Olympiad in Informatics. It can be also used as a problem test tool in the programming contest and daily practice. It provides many security features to ensure the smooth implement of judgement.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24

    rlink

    ssh-tunnel instead vpn in one exe

    Create ssh-tunnel, run another programm and store settings in self. It is easier than to create a vpn and write instructions for the users.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    sha is a file hashing utility that uses the NIST's SHA-1, SHA-256, SHA-384, & SHA-512 hash algorithms. It can be used for file integrity checking, remote file comparisons, etc. The portable algorithm implementations can be useful in other projects too.
    Downloads: 1 This Week
    Last Update:
    See Project