Showing 73 open source projects for "linux secure remix"

View related business solutions
  • Find out just how much your login box can do for your customer | Auth0 Icon
    Find out just how much your login box can do for your customer | Auth0

    With over 53 social login options, you can fast-track the signup and login experience for users.

    From improving customer experience through seamless sign-on to making MFA as easy as a click of a button – your login box must find the right balance between user convenience, privacy and security.
  • Red Hat Ansible Automation Platform on Microsoft Azure Icon
    Red Hat Ansible Automation Platform on Microsoft Azure

    Red Hat Ansible Automation Platform on Azure allows you to quickly deploy, automate, and manage resources securely and at scale.

    Deploy Red Hat Ansible Automation Platform on Microsoft Azure for a strategic automation solution that allows you to orchestrate, govern and operationalize your Azure environment.
  • 1
    USB_FORMAT

    USB_FORMAT

    Make Bootable USB Drive with MBR and 2 Partitions

    USB Format Tool - Make Bootable USB Drive with MBR and 2 Partitions. USB Multi-Boot of Linux ISO + Windows 10 VHD + Win10XPE in BIOS Or UEFI Secure mode.
    Downloads: 171 This Week
    Last Update:
    See Project
  • 2
    Syncthing

    Syncthing

    Open Source Continuous File Synchronization

    Syncthing is an open source continuous file synchronization program, which essentially works by synchronizing files between two or more computers in real time. Syncthing is designed to first and foremost keep users’ data safe and protected against data loss and against attackers who would unlawfully try and access this data. It doesn’t store data anywhere else except on your computers and uses encryption to secure all your data. It is very easy to use, cross-platform and automatic...
    Downloads: 105 This Week
    Last Update:
    See Project
  • 3
    Borg

    Borg

    Deduplicating archiver with compression and encryption

    BorgBackup or Borg for short is a deduplicating backup program that also supports compression and authenticated encryption. It provides a secure and efficient way to backup data, and is ideal for daily backups and backups to not fully tested targets.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 4
    restic

    restic

    Fast, secure and efficient backup program

    Restic is a backup program that is designed to be easy to use, fast, secure and efficient. It makes doing backups a fast and frictionless process, so you can backup your files every day if you need to. It supports backends for storing backups natively, including on the local directory, sftp server (via SSH), HTTP REST server (protocol rest server), OpenStack Swift, among many others. It also uses cryptography to ensure the confidentiality and integrity of your data. Restic supports Windows...
    Downloads: 5 This Week
    Last Update:
    See Project
  • Employee monitoring software with screenshots Icon
    Employee monitoring software with screenshots

    Clear visibility and insights into how employees work. Even remotely.

    Stay productive working at any distance from anywhere with Monitask.
  • 5
    Cryptomator

    Cryptomator

    Multi-platform transparent client-side encryption for your cloud files

    Cryptomator is a free and open source project that offers multi-platform, transparent client side encryption of your files in the cloud. It works with just about any cloud storage service; is totally transparent so you can work with your files how you normally would; and secure with a 256-bit key length AES encryption. It’s also simple and easy to use with no need for different accounts, key management, cloud access grants or cipher configurations.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 6
    AWS Vault

    AWS Vault

    A vault for securely storing and accessing AWS credentials

    AWS Vault is a tool to securely store and access AWS credentials in a development environment. AWS Vault stores IAM credentials in your operating system's secure keystore and then generates temporary credentials from those to expose to your shell and applications. It's designed to be complementary to the AWS CLI tools, and is aware of your profiles and configuration in ~/.aws/config. By default, there is a dedicated Keychain for AWS credentials and Keychain prompts you when credentials...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 7
    ffsend

    ffsend

    Easily and securely share files from the command line

    ... is enforced to ensure your stuff does not remain online forever. This provides a secure platform to share your files. History tracking your files for easy management, ability to use your own Send hosts. Inspect or delete shared files, accurate error reporting. Streaming encryption and uploading/downloading, very low memory footprint. Intended for use in scripts without interaction.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 8
    MemGuard

    MemGuard

    Secure software enclave for storage of sensitive information in memory

    This package attempts to reduce the likelihood of sensitive data being exposed when in memory. It aims to support all major operating systems and is written in pure Go. Sensitive data is encrypted and authenticated in memory with XSalsa20Poly1305. The scheme used also defends against cold-boot attacks. Memory allocation bypasses the language runtime by using system calls to query the kernel for resources directly. This avoids interference from the garbage collector. Buffers that store...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    LibSecRm - Secure Removal Library

    LibSecRm - Secure Removal Library

    A library for secure deleting data on-the-fly

    LibSecRm (LIBrary for SECure ReMoval) is a set of replacements for these standard C functions which cause data removing from files. The data is first securely wiped on-the-fly, to protect the user's privacy, then the original functions are called. There is NO NEED to rebuild your software, because LibSecRm is a pre-loadable library, meaning you just need to RUN the software with LibSecRm loaded. LibSecRm is also a development library. The following wiping methods are supported: Gutmann...
    Downloads: 0 This Week
    Last Update:
    See Project
  • ContractSafe: Contract Management Software Icon
    ContractSafe: Contract Management Software

    Take Control Of Your Contracts Without Wrecking The Budget

    Ditch those spreadsheets, shared drives & crazy-expensive solutions with too many bells & whistles. ContractSafe offers the simplest way to manage your contracts efficiently without breaking the bank.
  • 10
    PeaZip

    PeaZip

    Free Zip software and Rar extractor

    ...), split files, strong encryption with two factor authentication, encrypted password manager, secure deletion, find duplicate files, calculate hashes, export task definition as command line script.
    Leader badge
    Downloads: 1,130 This Week
    Last Update:
    See Project
  • 11
    BleachBit

    BleachBit

    deletes junk files to free disk space and improve privacy

    BleachBit frees disk space and maintains privacy. Cleans cache, Internet history, temporary files, logs, cookies, Firefox, Google Chrome, Flash, Windows, Linux, and more. Downloads are at www.bleachbit.org and source code is at GitHub.
    Leader badge
    Downloads: 993 This Week
    Last Update:
    See Project
  • 12
    q4rescue

    q4rescue

    A live linux Rescue toolkit/Emergency OS - based on q4os Trinity

    A live linux system rescue toolkit based on q4os Trinity available as a bootable iso for administrating, repairing and cloning/restoring your system and data. Main tools included: -Rescuezilla -Clonezilla -DDrescue-gui -qtfsarchiver -Apart -Testdisk -Photorec -Boot Repair -WoeUSB -Q4OS imager -UNetbootin -usbimager -Kdirstats -Kdiskmark -Rclone & Rclone BRowser -Reminna -Filezilla -qbittorrent -gohttpserver -chromium -nwipe -ntpw-gui -efibootmgr -zenmap (nmap gui...
    Leader badge
    Downloads: 61 This Week
    Last Update:
    See Project
  • 13
    duply (simple duplicity)
    Duply is a shell front end for the duplicity backup tool https://duplicity.us . It simplifies the usage by implementing backup job profiles, batch commands and more. Secure backup to non-trusted file spaces made easy.
    Leader badge
    Downloads: 58 This Week
    Last Update:
    See Project
  • 14
    WipeFreeSpace

    WipeFreeSpace

    Secure wiping/shredding of free disk space with many methods

    WipeFreeSpace is a program to securely erase/wipe/overwrite/shred the free space on file systems WITHOUT DESTROYING EXISTING FILES, to prevent recovery of deleted sensitive data. This allows protecting the user's privacy when e.g. selling the drive or the whole computer. The following filesystems are supported: - Ext2/3/4, - NTFS, - XFS, - ReiserFSv3/4, - FAT12/16/32, - MinixFS1/2, - JFS, - HFS/HFS+, - OCFS. The following wiping methods are supported: Gutmann-like, random,...
    Leader badge
    Downloads: 47 This Week
    Last Update:
    See Project
  • 15

    littleutils

    Various small and useful command-line utilities

    The littleutils include duplicate file finders (repeats, repeats.pl, repeats.py), image optimizers (opt-jpg, opt-png, opt-gif, recomp-jpg), file rename tools (lowercase, uppercase, pren), archive recompressors (to-gzip, to-bzip2, to-bzip3, to-7zip, to-lzma, to-lzip, to-xz), a tempfile utility (tempname), file property tools (filedate, filemode, filenode, fileown, filesize, and lrealpath), and others. See the README file for more details.
    Downloads: 12 This Week
    Last Update:
    See Project
  • 16
    NDW - Network Data Wiping Hard Disks HDD

    NDW - Network Data Wiping Hard Disks HDD

    Wipe erase data from hdds on the network, unlimited hard disks

    Automated network based hard disk drives / storage devices erasure is server based software which installs on a central server. Server is connected to network switches and several PXE boot enabled workstations are attached to the network. As soon as the workstation is powered on, it boots off the network via the server and begins wiping all the attached hard disk drives. Once all the hard drives are wiped, data related to each hard disk is stored in the central server’s database. Read...
    Downloads: 13 This Week
    Last Update:
    See Project
  • 17
    CliFM

    CliFM

    The command line file manager

    A file manager for the Unix terminal. Unlike most file managers out there, based on the TUI, CliFM is entirely based on command-line. It is also ultra-lightweight, lightning fast, extensible, and written in C.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 18
    Underscore Backup

    Underscore Backup

    Private, secure backups in the cloud.

    Private, secure backups in the cloud of any size with minimal resource usage exactly the way you want them. Your data is encrypted by default using encryption keys only available to you and before leaving your network. Backed up data is signed to ensure protection from tampering. Data can be stored with any amount of redundancy and even multiple backup locations simultaneously. No information about the contents of your data is saved in any backup location. Only you can download and access...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 19

    DavUtils

    Powerful webdav client and sync tools with client-side AES encryption

    .... The integrated client-side AES encryption makes it secure to use public clouds.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 20
    SsDel by Softsimple

    SsDel by Softsimple

    Secure deletion file or folder

    FREE CONSOLE APPLICATION!! Secure file deletion. Console mode application for Windows 64 bits and Linux 64 bits (from Ubuntu version 20 or equivalent. If it doesn't work on your distribution, please let me know). Files or directories can be deleted recursively. Zero pad each file in the given path before deleting it. I hope you find it useful :-) DISCLAIMER Use it at your own risk! LICENSE Freeware license.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    GnuCopy
    GnuCopy is an Open-Source tool to copy and archive all your important data. It supports all important archive typs like Zip and Tar to guaranty an easy and secure exchange between all types of operating systems. Additionally, you can create profiles to blacklist or whitelist specific file types or folders to seperate your big data stores for backups.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Naeon

    Naeon

    The safest way to store private data in untrusted (cloud) environments

    Naeon is a secure cloud storage solution that uses unbreakable military-grade encryption and zero-knowledge privacy to protect confidential data in an untrusted environment. The data are encrypted using the AES 256-bit encryption algorithm with a randomly generated 128-character passphrase. Then, it is split into small pieces called chunks, which are obfuscated by adding random data to each chunk to make them unreadable and indecipherable to unauthorized individuals or processes...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Redo Rescue: Backup and Recovery

    Redo Rescue: Backup and Recovery

    Backup and Recovery Made Easy

    Redo Rescue Backup and Recovery can backup and restore an entire system in minutes with a point-and-click interface anyone can use. Bare metal restore to a new, blank drive and be up and running in minutes. Supports saving to and restoring from local disks or shared network drives. Selectively restore partitions and remap them to different locations on the target drive. Additional tools included for partition editing, web browsing, and more. Runs from live CD/USB; no installation needed. ...
    Leader badge
    Downloads: 1,307 This Week
    Last Update:
    See Project
  • 24
    Xorin

    Xorin

    Xorin data erase & clone software

    Xorin is a secure drive erase program that provides the perfect solution to anyone who wants to secure their private data before selling or utilization their PC or drive storage. Xorin is also good in all situations where you want to ensure that deleted data stays deleted and that it can never be recovered. Xorin operates from its own Linux-based bootable environment, Linux or Windows operation system. Xorin supports all popular security methods and standards including DoD 5220.22-M. You...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 25
    The Wizard Desktop is a set of simple applications that maintain a common user experience along with a simple window manager. The underlying framework will allow a single-user multiple network connected computers paradigm. Communications between the framework and applications are standardized, programs can be swapped out at will. Please visit the OpenHub site.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next