As today’s workforce becomes increasingly connected and mobile at the same time, communicating simply via email or a phone call doesn’t always cut it. Therefore, it is now crucial for businesses to equip their employees with a solution that seamlessly integrates a broad range of communication methods to allow businesses to communicate and collaborate more efficiently. And a Unified Communications (UC) solution is the answer.Sponsored Listing
OSI-Approved Open Source (1,575)
- GNU General Public License version 2.0 (1,034)
- BSD License (259)
- GNU Library or Lesser General Public License version 2.0 (134)
- GNU General Public License version 3.0 (111)
- MIT License (48)
- Apache License V2.0 (31)
- GNU Library or Lesser General Public License version 3.0 (17)
- Academic Free License (15)
- Apache Software License (12)
- Common Public License 1.0 (10)
- Artistic License (7)
- Open Software License 3.0 (7)
- Mozilla Public License 1.0 (6)
- Mozilla Public License 1.1 (6)
- zlib/libpng License (6)
- Public Domain (42)
- Other License (35)
- Creative Commons Attribution License (10)
- Linux (1,504)
Grouping and Descriptive Categories (1,169)
- All POSIX (859)
- All 32-bit MS Windows (222)
- All BSD Platforms (167)
- 32-bit MS Windows (143)
- OS Portable (135)
- OS Independent (93)
- 64-bit MS Windows (52)
- 32-bit MS Windows (39)
- Project is an Operating System Distribution (14)
- Project is OS Distribution-Specific (12)
- Project is an Operating System Kernel (10)
- Modern (952)
- BSD (904)
- Windows (715)
- Mac (544)
- Android (223)
- Solaris (108)
- Programming Language: C ×
A collection of public-key Web-of-Trust tools for trusting anonymous users. This is to facilitate communications, where nation-based identity is not required, but assured that the public-key belongs to a specific online identity.
Tunnel all your your shell commands/tools through HTTP, Socks4 or Socks5 proxies. Different proxy types can be mixed in the same chain and supports authentication for HTTP and Socks5. It works by hooking all the calls to connect().1 weekly downloads
Anoubis is a Security Suite which implements a secured environment for applications. The core of the suite is an Application Firewall alongside with a Sandbox. Mechanisms to assure the authenticity of files, directories and applications are provided.
You’re probably paying too much for cell phone service. Wirefly compares hundreds of plans to help you save. Enter what you need (minutes, data, texts) into Wirefly’s innovative plan comparison tools and see your savings instantly.Sponsored Listing
How to detect multimedia spam such as image spam? This project implemented some algorithms to detect and recognize the image spam based on Image Processing, Pattern Recognition incluing Edge-Detection,Region-Grow, ANN, SVM, LLE, ICA, PCA,etc.
Library with anti-spam protect methods, e.g. whitelist, greynet, callback and etc.
artraced is a multithreaded traceroute detector. It reveals the tracing ip and hostname. If in promiscuous mode it reveals all incoming traceroute attempts to any workstation on its subnet. Run as daemonize (-d ) if specified in command line.
ArdAlarm project team develop alarm using Arduino open-source development kit.
Secure, effective and universal Virtual Operating System implementation; completely new VM design; simple but powerful rIPC mechanisms - see http://argante.sourceforge.net/advocacy.txt for more information.
Argusproxy is a gateway to redirect malicious connections in Honeypots network. It is in charge of orchestrating the filtering and the redirection between a front-end of low-interaction honeypots, and a back-end of high-interaction honeypots.
Ariesbot, is an ircbot, which will be able of doing basic bot functions such as op/deop/kick/ban/moderate. Plus being able to Wu-Ftpd scans, cgi/php scans port scans, subnet scans and scan for vuln version of apache to nosejob.c.
Monitor and log all ARP traffic on a switched network, organized into html output with ARP spoof detection, network scan detection and misconfigured network device detection. NOTE: this project is currently not usable.
ARP handler inspection59 weekly downloads
A Gnome 2 Applet that listen,notify and log arp changes using arpwatch.
Arudius is a live CD based on Slackware and targets information security audience. It features a large collection of tools for information assurance, while maintaining small footprint (210MB mini-CD). To download it go to "Homepage" from the menu above
Assh (Anonymous Secure SHell) establishes an anonymous connection to ssh servers, using SSL proxies.3 weekly downloads
The goal of the project is to build a framework to allow Astaro firewall users to install optional software packages on their firewalls. (Astaro is a Linux-based firewall available from www.astaro.com.) Such a framework includes a package-management syst
In this project we present myEchelon, an intelligent system capable of carrying out the various stages of an Information Security Audit.
Linux Authentication Gateway which allows to make dynamic firewall rules based on usernames.
This is a apache v2.0 authentication module. Based on html form authentication and cookie authentication session. Cookie session are stored in memcache deamon. Can be used has an simple "Single Signe-On" (SSO). All the code source and the bug tracking has migrated to github: https://github.com/ZenProjects/Apache-Authmemcookie-Module All the documentation are here: https://zenprojects.github.io/Apache-Authmemcookie-Module/
Authenticating proxy server software for Mac OS X. The front-end is written in Obj-C using the Cocoa framework, but the actual proxy daemon application is written in C using plain BSD sockets.1 weekly downloads
Automated Security Tools (autosec) aims to provide automatic tools which network administrators may use to help check and test the security of their network.2 weekly downloads
Utmpd is a small and flexible daemon written in C.It's used as a tool for user acces control. It scans the utmp file seeking for loged users and kills the user if he matches deny rule (eg. if he'strying to log in at some predefined time, denyed host etc.
B-Trust eDoc is a program built on top of LibDigiDoc a free implementation of the OpenXAdES standard for signing/encrypting files using smartcard tokens. It also contains Openssl and PKCS11 wrapper classes in C++ which might be useful to developers.
GPL cryptographic functions using Binomial coefficients, Addition, Rotation, Panmagic squares and cubes.
BBSGen is an improved Blum-Blum-Shub pseudorandom number generator. It consists of a C library (libbbsgen) and command-line tool (bbsgen). BBSGen can be used in applications and command-line as secure, unpredictable and strong PRNG.2 weekly downloads