Showing 1336 open source projects for "java security for linux"

View related business solutions
  • Free and Open Source HR Software Icon
    Free and Open Source HR Software

    OrangeHRM provides a world-class HRIS experience and offers everything you and your team need to be that HR hero you know that you are.

    Give your HR team the tools they need to streamline administrative tasks, support employees, and make informed decisions with the OrangeHRM free and open source HR software.
    Learn More
  • Desktop and Mobile Device Management Software Icon
    Desktop and Mobile Device Management Software

    It's a modern take on desktop management that can be scaled as per organizational needs.

    Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
    Learn More
  • 1
    This turns a PDA with a wireless connection into a internet telephone.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    The functional objective is to provide a simple secure socket infrastructure for client/server apps. The usability objective is to allow inexperienced developers to deploy the system and write "Hello World" with a single page of documentation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    This is a project that simulates the German Military Enigma machine during WWII.. It is a project for beginers to learn to program and to meet people. If anyone is interested in helping, please email me @ dustin@rockhill.org
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Free Crypto Token will be a free, operating system independent and standard driven interface to smartcards, key files and other hard- and software crypto tokens. In fact FCT will be a framework for PKCS#11 modules that will also include some implementati
    Downloads: 0 This Week
    Last Update:
    See Project
  • Defend your online revenue Icon
    Defend your online revenue

    Remove counterfeits, stop piracy, and monitor sellers automatically to safeguard your brand's future

    Red Points is the world’s first brand intelligence platform. By combining online brand protection, copyright enforcement, and distributor monitoring capabilities, Red Points gives you full visibility into brands’ presence online. Over 650 brands rely on Red Points to fight fakes, piracy and distribution abuse online, allowing them to maintain control, improve their brand value, and increase revenues.
    Learn More
  • 5
    Very simple wrapper for using some common pgp commands from within python. Requires PGP5.0i or better(ish).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    The Small Crypto Library is a collection of C++ classes for public and private key cryptography. The Small Secure Socket Library uses SCL for maintaining secure IP connections.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    The RAZip bitstream format was designed to provide a faster random access to compressed data than what is currently possible using the GZIP format. During the desing phase, some other features were added, like encryption and error correction.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    A Java-based secure communications hub for text, voice and data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Novus Ordo Seclorum (Ordo for short) is a pathologically secured, invitation only secure communications framework. It is built on top of the Freenet crypto libraries.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Discover the power of eDiscovery for law firms. Icon
    Discover the power of eDiscovery for law firms.

    Streamline your legal processes and ensure compliance with our eDiscovery company.

    DWR eDiscovery allows legal professionals to process, analyze, review, and produce documents that are relevant to litigation and other legal disclosure obligations. Our tools allow easy ingestion and analysis of client and opposing party documents using a comprehensive set of document review features including AI search, keyword search, keyword highlighting, metadata filtering, marking documents, privilege log management, redactions, and a range of analysis tools to help users best understand their document corpus.
    Learn More
  • 10
    An API and test suite, or possibly an application unto itself, to manage keys and allow mail user agents (such as pine or mutt) to use encryption and authentication systems (such as S/MIME) via the services of external encryption suites (such as OpenSSL)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    sectar: a program that creates encrypted tape archives(tar files), using the AES algorithm Rijndael. Encryption exported under exemption TSU 740.13. Was star, now sectar.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 12
    ZipCracker is a program to help users recover files from password protected zip archives. It has a easy to use Gnome User interface.
    Downloads: 27 This Week
    Last Update:
    See Project
  • 13
    iSSL is a minimalistic cryptographical API that uses the ciphers RSA and AES to establish SSL-alike, secure encrypted communications between two peers communicating through a network socket, including session key generation and public key exchange.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Whisper is for keeping your private communications private. Whisper is designed to be easy to use (no PKI). Also Whispers can be written on paper if you have to. You don't need your correspondent to generate a key before you can Whisper.
    Downloads: 57 This Week
    Last Update:
    See Project
  • 15
    Two projects in one: easy to use javascript shopping cart and RSA-type javascript browser-based public-key encryption. Ecommerce without cgi!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    How to set up a Linux system to use encryption in disk and network accesses. This document describes how you can use the International Kernel Patch and other packages to make harddisk contents and network traffic inaccessible to others by encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    An easy to use GUI for cryptanalysis of pre-digital ciphers. Usefull for historical researchers, the rabidly paranoid, or those who do crypto for fun. Future releases will move upwards towards more modern cyphers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Secure Java Instant Messenger. Supports asymmetric key encryption of messages. will support multiple protocols (Jabber initially) and multiple UIs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    A console-based tool for Linux that will provide simple functionalities to help decipher substitution ciphers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Integrating GPG/PGP into various messaging clients.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    gpkcs11 is an free implementation of the PKCS#11 Interface standard for cryptographics token. It includes one software-only token and will aid in writing support for hardware token. It also includes a test suite that will be extended to serve as a compreh
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    A peer-to-peer chat program that uses public key encryption (via Gnu Privacy Guard) to keep your conversations from the eyes of packet sniffers (*Cough* Carnivore *Cough*)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Enkript is an user-friendly file ciphering program. It uses the popular algorithms MD5 and IDEA (used in PGP, for example). It detects automatically whether to encrypt or decrypt the given file, and badly deciphered files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    KWoodhammer is the all-in-one solution for traditional encryption methods as you know from Enigma, the Pope or the Russian Secret Service (KGB).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    GPG is a Perl5 interface to gnupg (see http://www.gnupg.org). You can use standard scalar to communicate with gnupg. IPC is managed by IPC::Open3.
    Downloads: 0 This Week
    Last Update:
    See Project