Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
Learn More
All-in-one security tool helps you prevent ransomware and breaches.
SIEM + Detection and Response for IT Teams
Blumira’s detection and response platform enables faster resolution of threats to help you stop ransomware attacks and prevent data breaches. We surface real threats, providing meaningful findings so you know what to prioritize. With our 3-step rapid response, you can automatically block known threats, use our playbooks for easy remediation, or contact our security team for additional guidance. Our responsive security team helps with onboarding, triage and ongoing consultations to continuously help your organization improve your security coverage.
Stream Shield is a program to encrypt and anonymize your connection to the internet by connecting to remote proxies, using Blowfish/Rijndael Algorithms and removing many personally identifiable headers such as referer, user-agent and more.
Overcoat encrypts your projects exe file before distribution (for shareware authors for example), that limits the use of an exe file, and forces the user to purchase/registar after a certain developer defined period
The Secure Remote Log Monitor (SRLM) project provides client and server
utilities that collect application or system log files from multiple systems over an untrusted network onto a central server for analysis and action.
Infranet is a system that attempts to circumvent web censorship by allowing clients to surreptitiously request sensitive content via cooperating Web servers distributed across the global Internet.
*PassGuard suite provides a series of application used to manage your numerous passwords in an encrypted file. Additionally, a C++ framework is provided to create password management applications. Plugins system managed different encryption methods.
A simple working implementation of 64-bit DES encryption/decryption alogrithm in C++. Could act as guide to undestanding the algorithm. Its buggy so help me out :-)
It's a modern take on desktop management that can be scaled as per organizational needs.
Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
I needed a library of functions that enabled me to perform hash
functions and symmetric cryptography. I chose MD5 initially but
eventually chose SHA as the hashing algorithm due to concerns regarding
the \'collision resistance\' of MD5 due to weakne
A C++ library implementing the XML DSIG and XML Encryption standards. Based on the Apache project's Xerces (DOM/SAX parser) and Xalan (XSL/XPATH processor) libraries.
This project will focus on developing a C++ implementation of the Group Secure Association Key Management Protocol (GSAKMP) proposed via an Internet Draft in the Multicast Security Working Group of the Internet Engineering Task Force.
RG-Safe uses the Cryptlib library to keep all your information "safe". You can import files into your SAFE. From there you can securly view it, reencrypt it, export it or email it securly to someone on your keyring. You can sign/check files & also comat
Geheimnis is no longer maintained (use of kpgp is now recommended). Geheimnis was an application for UNIX/KDE that "wraped" around encryption programs and their irksome command-line interface, making it easier for users to use these programs.
This is a simple program to encode normal, ASCII text in to its ASCII value and then convert that number to roman numerals. Ideal for quick notes to friends that you don't want others to easily read. Unlike encryption though, I just described the algo
No-Name Instant Messenger is a secure (strong cryptography), cross platform communications program that supports existing IM networks (AIM, Yahoo, ICQ, etc.).
RSA-IP is a Linux kernel net _protocol_ which encrypts IPv[4;6] using RSA public/private key.Think of it as a kernel level implementation of ssl. RSA needs prime number so we release a prime searcher.
E-Dot (which means Encryption and Decryption Of Texts) is a very small tool for encrypting textfiles. E-Dot doesn't use Keyfiles: A password is enough. This tool is available for Linux and Windows, too.
CryptographyTool,analyzes relatively easy cryptograms
for getting into the material
The easy cryptograms are mostly any kind of an substitution
cipher(mono or polyalphabetic)
So the program gives you a few tools with which you can
analyse and edit t