MSLK provides the precompiled Win32 binaries of some excellent porject with a GPL or similar open source license. Here will keep updated.
PEStudio is a network protocol analysis and security auditing tool for Windows which allows you to apply scripts to winsock calls in order to filter / edit the data that travels to and from your computer, giving you complete control over your network.
Digital Rights Management example library for C Spot Run.
A simple C++ library to code/decode data.
IP Tables State implements the "state top" feature from IP Filter for IP Tables. "State top" displays the states held by your stateful firewall in a "top"-like manner, in real time. IPTState also has an option to print your state table once and NOTE: Development has moved to github: http://github.com/jaymzh/iptstate
BIS Development Kit protects your web content (texts, images, html etc) from copying and direct downloading. It also protects your Java(tm) applications from reverse engineering and your algorithms and ideas from the plagiarism.
A Linux distro based on Linuxcare Bootable Business Card, this is a emergency tool with many uses
Foam is a lightweight cryptographic protocol for privacy: it will authenticate and secure a communications channel using a shared secret. EXPERIMENTAL
Development of software in support of the Portable Network Graphics (PNG) Digital Signature (dSIG) chunk.
Peerblock With the best Block lists pre-installed
Peerblock 1.1 Extreme, msi, all the best Blocklists to make your PC alot safer from internet threats while surfing, file sharing, etc. See screenshots for block lists included. Build stays at 1.1 as we all know newer peerblock is time bombed. This one is not! All online lists are updatable and some AIO blocklists included for Anti infringement example: https://blocklist.sigmaprojects.org/ http://john.bitsurge.net/public/biglist.p2p.gz Start with windows is deselected you can select it yourself.
Pombo can help you recover your computer in the event it's stolen.
Pombo works silentely in the background, hidden, and sends tracking information to a webserver of your choice. If your computer is stolen, just log into your webserver to get the lastest file uploaded by Pombo, decrypt and hand it to the police. They will have all they need to catch the thief: IP address, date/time, nearby routers, screenshot, and even a photo of his/her face if you have a webcam ! Pombo protects your privacy: Tracking information is encrypted with rock-solid GnuPG and only you can decrypt it.
Multi-platform spam filtering proxy, designed to be used on the client side. Can be launched as faceless server or with a GUI.
<b>Team MONICA</b>'s effort:<br> - general JAVA environment<br> - general JAVA cryptography environment<br> - SSH client/server in JAVA<br> - secure & anonymous communication
Was a stream cipher attempt, but has been orphaned.
saifix (sx) kernel project support libraries, components and tools "adapted" / "used" from works under "category A" list. When building a library or application that composes works from this set, specific attribution should be added to NOTICE file.