Pwmd allows a (libpwmd) client to store and retrieve data in an encrypted XML file via an element path. An element path is a TAB delimited string where each element name is a depth of the element tree similar to how a filesystem hierarchy is organized.
Each element of the element path may also contain an ACL to limit client access to an element path; beit a client connecting over UDS or TLS. An element may also contain a "target "attribute that resolves to another element path in the XML document similar to a symbolic link in a filesystem.
...
...And as already mentioned, it's just the most efficient tree-based sorting algorithm that you can get.
But furthermore this way of finding primes interestingly leaves a hard nut to crack for mathematicians: In very rare cases it finds numbers that are not primes. For all primes below one million this phenomenon arises in exactly two cases:
31213 which is 7 * 7 * 7 * 7 * 13
336141 which is 3 * 3 * 13 * 13 * 13 * 17
Who can explain, why?
Difftree has moved to GitHub (https://github.com/rondilley/difftree)
dt is short for difftree and it is a fast directory comparison tool for security incident response when you don't have time to run tools like tripwire or osiris.
sha3sum - A demonstration of the Keccak permutation.
...Usage is much more than a hash function. The NIST compatible settings are subject to change when they publish FIPS PUB 180-5. I wrote this program when evaluating the permutation and developing tree hashing for the Intel(R) MIC architecture.
B-Trust eDoc is a program built on top of LibDigiDoc a free implementation of the OpenXAdES standard for signing/encrypting files using smartcard tokens. It also contains Openssl and PKCS11 wrapper classes in C++ which might be useful to developers.
PocketPuTTY is a Pocket PC port of famous PuTTY (SSH client). Smartphone support is also planned.
The long-term goal is to get PocketPuTTY included into official PuTTY development tree.
The modWASTE project is used by WASTE developers to experiment with modifications that may be added to the main WASTE source tree. These modifications are experiments for WASTE 2. modWASTE may eventually contain features not avalible in WASTE.
Bait and Switch combines IDS tech (Snort primarily) and Honeypots into a new, more valuable, reactive system. After receiving an alert, B&S protects your server by silently redirecting hostile traffic to a honeypot while leaving other traffic alone.
A client/server application designed to let the user monitor a directory
tree on a remote machine by creating snapshots of current file status in order
to later detect file modification, addition and/or removal.