Tested Devices : 1.Samsung Galaxy Y 2.Samsung Galaxy Y Duos Procedure : 1.copy both files in root of memory card 2.Insert that memory card in your android device 3.Now switch off your device 4.Now press volume up + power + home button together to start recovery mode 5.In this mode touch will not work so navigate using volume up and down keys and select using home button 6.Now select ‘update zip from sd card’ 7.Now select 'cwm.zip' 8.Yellow coloured menu will appear 9.Select ‘install zip from sd card’ 10.Then select ‘choose zip from sd card’ 11.Select ‘ delete_passward.zip’ 12.Now select ‘yes’ 13.Then the process will complete after some time 14.Now press back and select ‘Reboot Device’ 15.Now Draw Any pattern your device will unlock 16.Now to set new pattern lo
Android smartphone app that calls a phone number in case noise of a certain strength (typically: a baby's crying) is detected.
AngeL makes your host unable to send hostile traffic across the network. It also blocks a large number of root compromise attacks and local denial of services, using LSM framework and perfom input sanity checks allowing or not the requested services.
A cross-platform network scanner that is fast and simple to use
Angry IP scanner is fast and friendly network scanner for Windows, Linux, and Mac. It is very extensible, allowing it to be used for very wide range of purposes, with the primary goal of being useful to network administrators.
A free and easy-to-use password protected file archiver
Ank Zipper provides you with a lightweight, Java-based application designed to provide security to your documents. Ank Zipper can compress both files and folders and create password-protected archives, in order to prevent unauthorized access to important files. Additionally, it can be used for extracting or simply browsing ZIP files.It includes AES(Advanced Encryption Standard) algorithm to encrypt/decrypt file(s). Ank Zipper is a cross-platform software that can be used on any platform that features Java compatibility (e.g. Mac OS X, Linux, Windows).
A webinterface for IPTABLES.
Ano (Anonymous Network Overlay) is a decentralized IP router based on relaying principle. In Ano all IP traffic is anonymized, including TCP, UDP, ICMP and DNS protocols. Each node acts as a relay and NAT for external traffic.
The project attempts to avoid the problem of false positives and provide added application level security and service by seperating secure and non secure data in a database at application level.
AnomalyDetection - Snort(tm) preprocessor
AnomalyDetection is the Snort(tm) preprocessor based on anomaly detection mechanism. AnomalyDetection is written by students Maciej Skowroński and Radosław Wężyk. A last version with some bug deleted is written by Mariusz Tomaszewski. The current (early beta) version of the program can analyze network traffic, generate traffic profile and detect traffic anomalies. You can freely download and use this program (please read documentation before).
Anomos is an anonymous, encrypted multi-P2P file sharing protocol, originally based on BitTorrent. See our homepage for more details.
A collection of public-key Web-of-Trust tools for trusting anonymous users. This is to facilitate communications, where nation-based identity is not required, but assured that the public-key belongs to a specific online identity.
Experiments with anonymous routing
Anond is a ongoing experiment striving to provide transparent IP-level anonymization using virtual network interfaces, peer-to-peer and overlay network techniques. Anond is an implementation of an anonymous routing protocol with ideas taken from the paper "Anonymous overlay network supporting authenticated routing" by Roman Schlegel and Duncan S. Wong.
Anonymous Android ROM - HTC Amaze 4G
AnonyROM is as the name suggests, A ROM based around anonymity for the HTC Amaze 4G. It is built on HTC's stock 4.04 ROM, with Sense completetly stripped out and a custom FAUX kernel. It uses the TOR network to keep your DNS/IP private and by default all services that collect information are disabled for anonymity/security.
Anonycat is web-based software that allows you to surf the web anonymously and bypass overly restrictive corporate firewalls or monitoring/blocking software. It can be used online (http://anonycat.com), or run as a service on your own webserver.
kaos.theory's Anonym.OS LiveCD is a bootable live cd based on OpenBSD that provides a hardened operating environment whereby all ingress traffic is denied and all egress traffic is automatically and transparently encrypted and/or anonymized.
Abstract—The security challenge coming with the popularity of web-based applications is a serious matter. The privacy of the data sent back and for has become a crucial issue. As a matter of fact, in one of their most recent publications, Chen et al analyzed this problem and showed that, although the existence of powerful communication security systems such as HTTPS, WPA/WPA2 Wi-Fi encryption, several high-scaled Webapps are exposed to side-channel attacks using timing and a subset of the applications’ internal information flows. In response to it, Liu et al developed a privacy model, introduced by Chen et al , to prevent this threat. The approach aims to protect the size of the packets exchanged during the communication between the client and the server and makes use of the privacy-preserving traffic padding (PPTP). Our paper proposes a novel economical mechanism to achieve this PPTP on the basis of the well-known privacy preserving method called ldiversity.
Tunnel all your your shell commands/tools through HTTP, Socks4 or Socks5 proxies. Different proxy types can be mixed in the same chain and supports authentication for HTTP and Socks5. It works by hooking all the calls to connect().
With this system, a person can ask a yes/no-question to group of people while their answer is kept completely anonymous. The project is based on the dining cryptographers protocol.
Another Backup Plugin (ABP) is a plugin for the KeePass password manager (Classic Edition). ABP automatically copies the initial password database to one or more backup files, so that the passwords can be recovered in case of loss.
The program generates random passwords using random characters or word lists. It is only for the .NET platform.
Anoubis is a Security Suite which implements a secured environment for applications. The core of the suite is an Application Firewall alongside with a Sandbox. Mechanisms to assure the authenticity of files, directories and applications are provided.
Anti Inference Hub is the first dynamic query processing engine that defends against the Inference Problem in Multilevel Databases by integrating smoothly with common DBMSs (Oracle, PostgreSQL, and MySQL), and monitoring queries submitted by users. The project source is hosted at: https://github.com/angyjoe/aih. Post your questions to Anti Inference Hub mailing list at: https://lists.sourceforge.net/lists/listinfo/aih-list.
It is temporary. Anti Security Threats Foundation is based on.
How to detect multimedia spam such as image spam? This project implemented some algorithms to detect and recognize the image spam based on Image Processing, Pattern Recognition incluing Edge-Detection,Region-Grow, ANN, SVM, LLE, ICA, PCA,etc.
Anti-Spam SMTP Proxy Server implements multiple spam filters
The Anti-Spam SMTP Proxy (ASSP) Server project aims to create an open source platform-independent SMTP Proxy server which implements auto-whitelists, self learning Hidden-Markov-Model and/or Bayesian, Greylisting, DNSBL, DNSWL, URIBL, SPF, SRS, Backscatter, Virus scanning, attachment blocking, Senderbase and multiple other filter methods. Click 'Files' to download the professional version 2.6.1 build 17355. An linux and a freeBSD based OVA of ASSP V2 are also available for download. An quick fixup build 2.6.1 18028 is available. NOTICE: V1 development has been stopped at the end of 2014 (1.10.1 build 16060). Possibly there will be done some bugfixing in future. Please upgrade to V2, which is and will be actively maintained.