Security & Utilities Software

OS OS

    • More...
  • More...
    • More...
    • More...

Category Category

License License

Translations Translations

  • More...

Programming Language Programming Language

  • More...

Status Status

  • More...

Audience Audience

User Interface User Interface

    • More...
  • More...

Database Environment Database Environment

Freshness Freshness

Security & Utilities Software

  • Locate Sensitive Data across Networks and Workstations Locate Sensitive Data across Networks and Workstations Icon
    Locate Sensitive Data across Networks and Workstations Icon

    Build the Business Case for Effective Security Investments

    Your customers recognize the importance of security, but often don’t realize the urgency until they see something tangible. SolarWinds Risk Intelligence assigns value to your data vulnerability, helping you build a strong business case for data protection and triage the most important problems to tackle. Some powerful features include data risk communicated as financial impact, at-risk data discovery and PCI DSS, PAN & PII scans.
  • Identify and respond to threats before damage is done Identify and respond to threats before damage is done Icon
    Identify and respond to threats before damage is done Icon

    A SIEM that makes it easy to use logs for security, compliance, and troubleshooting.

    SolarWinds® Log & Event Manager (LEM) delivers comprehensive Security Information and Event Management (SIEM) capabilities in a highly affordable, easy-to-use, and quick-to-deploy virtual appliance. LEM provides the visibility, security, and control that IT professionals need to alert on and respond to security threats, and assist in meeting the regulatory compliance guidelines of HIPAA, PCI DSS, SOX, and more. Try it free for 30 days!
  • yaSSL

    yaSSL, or yet another SSL, is an embedded ssl library for programmers building security functionality into their applications and devices. yaSSL is highly portable, and runs on standard as well as embedded platforms(QNX, ThreadX, VxWorks, Tron) yaSSL is still available but no longer being developed. Current development on the same project continues under wolfSSL. Visit yaSSL Home above for the latest stable release.

  • Catnip

    Servlet container extensions that help web developers write full featured Java web applications.

    Downloads: 1 This Week Last Update: See Project
  • Pace-IDS

    Pace-IDS is an Intrusion Detection system designed to replace Tripwire, in that it is faster, and more effective of detecting trojan activity, and is easier to configure. All you have to do usually is simply change one variable to your email address.

    Downloads: 1 This Week Last Update: See Project
  • Advert Filter List

    Advertising domain filtering list

    This is a list of advertising domains that can be used with a proxy server to remove unwanted advert traffic from the network. This list is directly compatible with tinyproxy, but may also work with other proxy servers.

    Downloads: 0 This Week Last Update: See Project
  • Codegroup Icon

    Codegroup

    A Java application for transferring computer files in 5 letter groups

    Codegroup is a Java application that will allow one to convert binary (or text) computer files in to 5 letter codegroups for transmission over email, landline telephones, radioteletype or Morse Code. Codegroup has internal error correction & limited cryptography capabilities. Codegroup : ZZZZZ YBPIL AIAIG FMOPP CPAAA DGNGP GPGPA ADNJN ELJKO ELIMO GEOHF KIFGP IFBCB PKCPI YJMHE PHBHP PPOBH NCOHD AKLLL AGHFP DEGEF LKELC EAIJI ABAGP AHPPO IHHPH OHPDF YNFPB ALEPO KMPKP Once this program has a graphical user interface, an Enigma like subsystem must be devised for data whitening. For content encryption, the use of Java's facilities is being considered as a long term option. This project's initial sourcecode is related to : http://www.fourmilab.ch/codegroup/ http://winmorse.com/ https://bitbucket.org/bgneal/cpp-enigma http://www.whence.com/minimodem/ For the User Interface http://www.oracle.com/technetwork/java/javafx/tools/

    Downloads: 0 This Week Last Update: See Project
  • Take Advantage of O365 + Online Backup Bundles Take Advantage of O365 + Online Backup Bundles Icon
    Take Advantage of O365 + Online Backup Bundles Icon

    The Perfect Small Business Offer That Packages Productivity, Disaster Recovery & Security Under One Price Tag. Join SherWeb to Start Reselling.

    Add more value to your Office 365 offers with Online Backup. The program will back up servers, desktops, virtual machines and smart devices, plus popular applications and Office 365 data. Online Backup comes with the Active Protection feature embedded, making it possible to stop any ransomware attack and restore encrypted files in a blink. It also provides a web-based intuitive console that eases backup and disaster recovery management.
    Are you an IT professional looking to profit from reselling Office 365?
    Sign up NOW, it’s FREE
  • Crypt Icon

    Crypt

    Crypt encryption and decryption is based on ASCII Table Shift.

    Crypt is the developed based on the ASCII Table shift and it can customized based on the user requirements, right from the shifting order and the level of encryption or decryption. It can be integrated to any of the programming language with the custom build of the source code. It can secure from text file to binary code.

    Downloads: 0 This Week Last Update: See Project
  • FDNS

    FDNS measures, detects, and notices the extremely anomalous traffic according to the bulk distribution aspect of flooding traffic, including: packet flooding attack, portscan, spam distribution.

    Downloads: 0 This Week Last Update: See Project
  • MAPDAV

    Designed to use what is known about users via the /etc/passwd file on unix/linux systems to generate a dynamic dictionary or csv file of more accurate guesses as to what their possible password may be, to look for bad password protection practices.

    Downloads: 0 This Week Last Update: See Project
  • Nifty Nerds Web Authentication

    Nifty Nerds Web Authentication - Authentication for your website that will make it easy to set up authentication and user tracking.(PHP)

    Downloads: 0 This Week Last Update: See Project
  • Prelude

    Prelude is an Hybrid Intrusion Detection system. It is composed of differents sensors and of a Manager. Currently distributed is an NIDS sensor. the Manager is for reporting attacks in an user readable form. Prelude is completly modulable and distributed.

    Downloads: 0 This Week Last Update: See Project
  • Get the Edge; Toad Edge Get the Edge; Toad Edge Icon
    Get the Edge; Toad Edge Icon

    Your next-gen toolset for MySQL database environments

    If your organization takes advantage of the cost-effective, flexible MySQL open source database platform, then you need a toolset that supports your commitment to open source relational databases.  Toad Edge for MySQL has what you need and helps you ramp up on MySQL quickly, ensuring faster time to value.
  • Programs Behaviour Analisis Tool

    - language perl / library Graph, XML::LibXML - OS platforms, all platform that support perl and lsof tool - This software aims to realize an HIDS, based on programs behaviour modelling.

    Downloads: 0 This Week Last Update: See Project
  • RamrodMinix

    Class project for computer security

    Downloads: 0 This Week Last Update: See Project
  • SWEB

    The overall objective of the SWEB project is to develop a secure, interoperable, open, affordable platform upon which secure cross border government services will be built.

    Downloads: 0 This Week Last Update: See Project
  • Sophie

    Sophie is a daemon which allows the use of the 'libsavi' library from the Sophos anti virus vendor ( www.sophos.com ).

    Downloads: 0 This Week Last Update: See Project
  • Tools for Liberty (LPTools)

    This project contains myriad tools for running successful political campaigns. While designed in the US, it should be easily portable to other nations as well, assuming a basic knowledge of the target locale's regulations and infrastructure.

    Downloads: 0 This Week Last Update: See Project
  • Ultramagnetic

    Ultramagnetic is a concurrent fork of GAIM that provides strong end-to-end encryption using libgcrypt and anonymous routing using the Six/Four protocol.

    Downloads: 0 This Week Last Update: See Project
  • antigift Icon

    antigift

    antigift is simple cross-platform, files & folders encryption tool

    antigift could be used for encryption files & folders on USB-flash or HDD partition(with ccrypt in background). Works out of box on Linux, Windows, FreeBSD, MacOS X and other on OSes. Do not required installation. Included wipe tool for wiping free space and misskey for recovering partially forgotten key. See documentation at http://sourceforge.net/p/antigift/wiki/Home/ antigift простой и кросс-платформенный инструмент для шифрования файлов и папок(с ccrypt в качестве основы) Подробности см. на страничке с русской документацией http://sourceforge.net/p/antigift/wiki/rus/

  • confiture

    Confiture is the new generation of the cryptographic software, Confiture use the all new innovation cryptographic.

    Downloads: 0 This Week Last Update: See Project
  • qscanq

    Qscanq scans every email message submitted to qmail before allowing it to be added to qmail's mail queue. Infected emails are rejected, not bounced, so you won't have to deal with double-bounces during virus outbreaks.

    Downloads: 0 This Week Last Update: See Project
  • rot13++

    This program will encode whatever you send it into rot13. What is rot13 you ask? An old school encoding system first developed by Julius Caesar to keep military documents safe. Sports file encoding, and copying to your clipboard. GUI planned also.

    Downloads: 0 This Week Last Update: See Project
  • sechk - SEcurity CHecKer

    sechk - SEcurity CHecKer It is a powerful and useful tool to check if you got exploited and rooted, it will use checksum comparation via md5 sum, it exchanges file lists and csums from the sechk server. It\'s gonna work with all posixes and unixes.

    Downloads: 0 This Week Last Update: See Project
  • Previous
  • You're on page 1
  • Next

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you