2 programs for "attacker" with 1 filter applied:

  • Secure remote access solution to your private network, in the cloud or on-prem. Icon
    Secure remote access solution to your private network, in the cloud or on-prem.

    Deliver secure remote access with OpenVPN.

    OpenVPN is here to bring simple, flexible, and cost-effective secure remote access to companies of all sizes, regardless of where their resources are located.
    Get started — no credit card required.
  • Free CRM Software With Something for Everyone Icon
    Free CRM Software With Something for Everyone

    216,000+ customers in over 135 countries grow their businesses with HubSpot

    Think CRM software is just about contact management? Think again. HubSpot CRM has free tools for everyone on your team, and it’s 100% free. Here’s how our free CRM solution makes your job easier.
    Get free CRM
  • 1

    Cloudture

    Cloudture is encryption using xor and one-time pads

    ... that if the attacker uses enough resources, he will be able to read the "secret" message, IF HE HAS STORED THE KEY IN HIS DATABASES. You could, for example, use a copy of the movie "1984" as the source for key. To make sure that e.g. the entire movie is stored eventually, the program allows you to specify an offset into the key source.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    This is a program that watches your system log files, looking for hack attempts. It instanty reacts to potential security breaches by (for instance) adding firewall rules to cut off the attacker.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next