Open Source Server Operating Systems Cryptography Software - Page 2

Cryptography Software for Server Operating Systems

  • Simple, Secure Domain Registration Icon
    Simple, Secure Domain Registration

    Get your domain at wholesale price. Cloudflare offers simple, secure registration with no markups, plus free DNS, CDN, and SSL integration.

    Register or renew your domain and pay only what we pay. No markups, hidden fees, or surprise add-ons. Choose from over 400 TLDs (.com, .ai, .dev). Every domain is integrated with Cloudflare's industry-leading DNS, CDN, and free SSL to make your site faster and more secure. Simple, secure, at-cost domain registration.
    Sign up for free
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1
    This program hidden inside compressed files of images, then these files can be extracted as if it were a tablet.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    GNet Server - Network compression client/server software. Compresses data over slow networks to save on the cost of bandwidth. Server is developed for Unix and Windows platforms, The client will run on Windows based PCs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    A JNI wrapper for the Microsoft Data Protection API
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    JavaLightServer is a multi-purpose server that can be used to share our desktop across the Internet with other authorized clients. It provides also a secure connection using SSL certificates.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Level Up Your Cyber Defense with External Threat Management Icon
    Level Up Your Cyber Defense with External Threat Management

    See every risk before it hits. From exposed data to dark web chatter. All in one unified view.

    Move beyond alerts. Gain full visibility, context, and control over your external attack surface to stay ahead of every threat.
    Try for Free
  • 5
    Designed to use what is known about users via the /etc/passwd file on unix/linux systems to generate a dynamic dictionary or csv file of more accurate guesses as to what their possible password may be, to look for bad password protection practices.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    The MD5Revolution is a small tool to calculate the MD5 checksum of entered strings. More features and additionally information about the tool, can be found under: http://md5r.x303.cc/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    No-Name Instant Messenger is a secure (strong cryptography), cross platform communications program that supports existing IM networks (AIM, Yahoo, ICQ, etc.).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    An anonymous pseudonym email server, such as that which runs nym.alias.net.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    OW.NET -- 1-Wire API port from Java (and J#) to C#. Use the Dallas 1-Wire and iButton chips with standard C# using a serial adapter (also CF.net) or the TMEX drivers on the Windows platform. No J# distribution installation required.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Resolve Support Tickets 2x Faster​ with ServoDesk Icon
    Resolve Support Tickets 2x Faster​ with ServoDesk

    Full access to Enterprise features. No credit card required.

    What if You Could Automate 90% of Your Repetitive Tasks in Under 30 Days? At ServoDesk, we help businesses like yours automate operations with AI, allowing you to cut service times in half and increase productivity by 25% - without hiring more staff.
    Try ServoDesk for free
  • 10
    Ocotillo Pseudo-Random Number Generator -- a cryptographically secure PRNG for Unix platforms that do not have a /dev/urandom.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    OpenPortalGuard is a flexible, extensible, and massively scalable access control system for portals. It provides single-sign-on features for username/pw and smartcards as well as declarative access control.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Open eSign allows software developers and technical parties in a company to create secure, online (web-based) forms and documents that follow a business process flow and enable legally recognized electronic signatures using digital signature technology.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    OpenVPN

    OpenVPN

    Robust and flexible VPN network tunnelling

    OpenVPN is a robust and highly flexible tunneling application that uses all of the encryption, authentication, and certification features of the OpenSSL library to securely tunnel IP networks over a single TCP/UDP port. Discussion forums and project wiki can be found here: https://forums.openvpn.net/ http://community.openvpn.net/openvpn
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Power Hasher is a program that allow you to get the hash code of multiple files at once, and export the results to a file, making easy for this file to be imported and the files checked. Currently it supports MD5, SHA1, SHA256, SHA384 and SHA512.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    PyEvcs

    Extended Visual Cryptography Schemes in Python

    Visual Cryptography is a graphical form of information concealing. In a 2-out-of-2 Visual Cryptography Scheme a dealer will "split" a secret image into two shares, print the shares onto separate transparencies and hand them to the participants to the scheme. If the two participants come together, they'll be able to reveal the secret image without a computer, perfectly superimposing the transparencies they own. Analyzing a single share, no one will be able to obtain any information considering the secret image no matter the computing or the analyzing power. In an Extended Visual Cryptography Scheme, both the secret image and the shares are meaningful images like a landscape, a building or a beautiful girl, hiding the very intention to conceal a secret. PyEvcs is a command line Python application allowing you to experiment with Extended Visual Cryptography Schemes for "natural" continuous tone images.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Real-Time Proactive Secret Sharing Library for RTAI is an implementation of the Shamir's secret sharing scheme and Herzberg's proactive secret sharing algorithm. The library uses a port of GNU GMP in order to make multiple precision arithmetic operatio
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Red Alert is a security alert system that can protect your computer area. The main goal of the system is to keep intruders off of your computer property.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    SBCD

    partitioning backup recovery and all kind of boot loaders

    partitioning backup recovery and all kind of boot loaders
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Seahorse is a Gnome front end for GnuPG. It is a tool for secure communications and data storage. Data encryption and digital signature creation can easily be performed through a GUI, and Key Management operations also can be performed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    This toolkit has complete security Package start from Tweak manager , Updater , Virus scanner ,Proxy server and many more This will be help full for user from corporate to small user we have already started working on it will completed with 2 months
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    https://github.com/bentonstark/starksoft-aspen https://www.nuget.org/packages/starksoft.aspen/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    TC-Wrapper is a Windows service which opens/closes TrueCrypt containers automatically using an USB-Stick with a key file. Containers are even mounted if you are not logged into your system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    See Matt Wright for PERL CGI scripts. Upgrade to Oracle8i if you need MD4/5 or binary operations for PL/SQL.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    The NEO Project uses the NEO-c (Network Exchange Operation for Charity) platform to participate in various computing challenges and projects, and donates any winnings to the charities specified by its users.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    A command line tool to create secure encrypted file using private key. You must provide key string to convert you source file into ecrypted one.
    Downloads: 0 This Week
    Last Update:
    See Project