Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Download Now
Desktop and Mobile Device Management Software
It's a modern take on desktop management that can be scaled as per organizational needs.
Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
A steganography tool. You can hide 2Gb file in multiple images, supported almost all graphic formats. Average capacity ~ 40%. Useful for publishing censored materials in the Internet. Details on the project's website (stegoshare.sf.net).
VDE2 OpenMoko Tunnel is a Python/GTK visual interface created for OpenMoko Freerunner. It is intended to build virtual ethernet tunnels to remote VDE switches.
This program is released under the GPL v2 as part of the Virtualsquare project.
This software implements the time stamp service. (mainly implements the Hierarchical Time-stamp Protocol. This protocol is proposed in a published paper which can be found in this package.)The code can help you to construct your time-stamp server.
IceNotes ME for Mobile Devices is an extremly usefull ;-) JAVA ME (J2ME) application to store all your important (text)notes on your mobile phone using "Twofish" encryption. Your notes are organized by assigning your own custom tags to your notes.
Kahunapule's Password Vault and Kahunapule's Random Password Generator allow you to generate and keep track of random passwords and other sensitive data. Requires Mono or .NET; runs on Linux, OS X, & Windows.
VAN sources private-party vehicles from over 20 platforms and provides all necessary tools to communicate with sellers and manage opportunities. Franchise and Independent dealers can boost their buy center strategies with our advanced tools and an experienced Acquisition Coaching™ team dedicated to your success.
This project includes: 1 A php linux extension to include encrypted php source files - c; 2 A command line linux application to encrypt/decrypt php source files - c; 3 A windows application to encrypt/decrypt php source files - builder c++
jHashCalc is a GPL implementation of the popular hashing utility "HashCalc" from SlavaSoft. jHashCalc is written in Java language, and uses the GNU Crypto API to perform the algorithms' computing.
Safe all your passwords and encrypt them with a single password? Yawn. Synchronize your encrypted entries between different machines? Without compromising your security? Here comes SyncYourSecrets
Store and retrieve passwords Online while keeping it secure. Web based (php+flatfile) for easy retrieval. All passwords stored are encrypted and the master (key) password is never saved. Even the user-id are all encrypted. CHECK PROJECT WEBSITE FOR DEMO!
it is about a GUI (Graphical User Interface ) program based on Qt4 library ,that hides data on a picture using differents method depending on picture format (BMP,JPG,PNG,...) (this is called Steganography) the data can be on any file format
Un programa para cambiar el orden de las palabras en una frase o las letras de una palabra u otros algoritmos. Su principal objetivo es cambiar las frases para hacerlas mas ilegibles o para aparentar ser más friki en tus conversaciones o por diversi
Crypto.Net is a free and open cryptography library for C# and .Net. AES (Rijndeal), Twofish, Blowfish, RSA, Diffie-Hellman, SSL/TLS, X509-Certificate builder, stream cipher modes or a secure netowrk stream are only some features of this library.
The Solitox Community system provides an integrated real-time chat service, web interface, and a scalable infrastructure for adding more services with common credentials. These interfaces allow a greater level of communication for your users.
platform independent solution to encrypt files on a portable Device. Files will be encrypted with TripleDES and hold in an XML-File. No local Installation needed.
PHP functions and classes to add a Domain Key Identified Mail (DKIM RFC 4871) signatures to emails sent by PHP. It is based on the openssl extensions of PHP. It can generate DKIM signature but cannot verify them.
Developped and tested on PHP 4.0.
The Cryptographic Implementations Analysis Toolkit (CIAT) is compendium of command line and graphical tools whose aim is to help in the detection and analysis of encrypted byte sequences within files (executable and non-executable).
Encrypti is a multi platform, easy to use encrypting tool for keeping your files secure. This application offers portability of encrypted files between various platforms. Secure your files with Encrypti!
An encryption/decryption engine which can encrypt any file(text, pdf , doc, rtf , gpg , mp3 , mp4 etc..) or any data on your PC such that only you with the valid password can decrypt it.Also it will compress the file while encrypting it.
obov stands for OATH Based OTP validator. It's a 100% pure Java library that provides simple to use methods to validate (and related utilities) one time passwords generated by OATH compliant devices.