Simple Project List Software Map

2199 projects in result set
LastUpdate: 2014-06-04 10:33

StoneVPN

StoneVPN is a system that makes it easy to create certificates and configuration files for use with an OpenVPN server for both Windows and Linux users. It has the ability to create a zip file and e-mail the entire package to a user. It uses pyOpenSSL and custom patches that allow it to manage a CRL file.

(Machine Translation)
운영 체제: Linux
프로그래밍 언어: Python, Python
LastUpdate: 2011-01-06 01:53

OpenProtect

OpenProtect is an anti-spam server that filters spam and blocks viruses, phishing, and other malware. Acts as an SMTP gateway and integrates with any email server like Postfix, Sendmail, qmail, Exim, Microsoft Exchange, Lotus Domino, Zimbra, etc.

LastUpdate: 2007-02-19 07:34

libmcrypt

Libmcrypt is a library which provides a uniform interface to several symmetric encryption algorithms. It is intended to have a simple interface to access encryption algorithms in ofb, cbc, cfb, and ecb modes. The algorithms it supports are DES, 3DES, RIJNDAEL, Twofish, IDEA, GOST, CAST-256, ARCFOUR, SERPENT, SAFER+, and more. The algorithms and modes are also modular so you can add and remove them on the fly without recompiling the library.

LastUpdate: 2013-05-24 21:27

fwlogwatch

fwlogwatch is a packet filter and firewall log analyzer with support for Linux ipchains, Linux netfilter/iptables, Solaris/BSD/HP-UX/IRIX ipfilter, Cisco IOS, Cisco PIX/ASA, Netscreen, Elsa Lancom router, and Snort IDS log files. It can output its summaries in text and HTML and has a lot of options. fwlogwatch also features a realtime anomaly response capability with a Web interface.

(Machine Translation)
LastUpdate: 2014-05-12 02:28

OpenCA OCSP Responder

The OpenCA OCSP Responder is an RFC 2560 compliant
OCSPD responder. It can be used to verify the
status of a certificate using OCSP clients (such
as Mozilla/Netscape7). The Responder is actually
included in the main OpenCA distribution package.
It is also possible to install the daemon as a
stand-alone application, in which case you will
need a CRL (or access to an LDAP server where the
CRL can be obtained).

(Machine Translation)
LastUpdate: 2009-09-12 21:31

CloudVPN

CloudVPN is a secure decentralized mesh networking tool. It allows applications to use it as a mesh transport layer for packet routing, easily creating mesh ethernet VPN, secured audio/video broadcasting or communication channels, etc. It can create secured networks with special or weird topologies, so it's very easy to create connection schemes with clustered/decentralized servers, topologies with better throughput, ring-like topologies for failover, long-line for passing through many routes, or tree topology for optimizing inter-server bandwidth needs.

LastUpdate: 2014-05-16 02:44

Password Manager Daemon

Password Manager Daemon serves clients data via a Unix domain socket or over a remote TLS connection. The data is stored in an (optionally) encrypted XML file, and the client must provide the key to modify it. It has the option to use gpg-agent for key management (including smartcards). It is multi-threaded, allowing more than one client to be connected at the same time. Key retrieval may be done via a key file or a pinentry program. A key cache is used, so a client won't need to enter a passphrase each time one is required. It is very configurable. Libpwmd is also available as a separate project and is a library making it easy for applications to use Pwmd.

(Machine Translation)
LastUpdate: 2013-09-10 14:13

Another File Integrity Checker

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. You can then run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

LastUpdate: 2005-01-25 09:34

Expresso Framework

Expresso Framework is an open standards-based J2EE architectural framework that allows the developer to concentrate on application logic. It is a library of extensible Java Server application framework components for creating database-driven Web applications based on open standards. Expresso integrates with Apache Jakarta Struts, which emphasizes presentation and application configuration, and bringing a powerful tag library to Expresso. Expresso adds capabilities for security, robust object-relational mapping, background job handling and scheduling, self-tests, logging integration, automated table manipulation, database connection pooling, email connectivity, event notification, error handling, caching, internationalization, XML automation, testing, registration objects, configuration management, workflow, automatic database maintenance, and a JSP tag library.

LastUpdate: 2011-02-14 23:11

sshguard

Sshguard monitors services through their logging
activity. It reacts to messages about dangerous
activity by blocking the source address with the
local firewall. Sshguard employs a clever parser
that can transparently recognize several logging
formats at once (syslog, syslog-ng, metalog,
multilog, raw messages), and detects attacks for
many services out of the box, including SSH,
several ftpds, and dovecot. It can operate all the
major firewalling systems, and features support
for IPv6, whitelisting, suspension, and log
message authentication.

(Machine Translation)
LastUpdate: 2010-04-30 12:26

FSlint

FSlint is a toolkit to find various forms of lint on a filesystem. At the moment it reports duplicate files, bad symbolic links, troublesome file names, empty directories, non stripped executables, temporary files, duplicate/conflicting (binary) names, and unused ext2 directory blocks.

LastUpdate: 2010-09-04 05:53

OpenCA

The OpenCA Project is a collaborative effort to develop a robust, full-featured and Open Source out-of-the-box Certification Authority implementing the most used protocols with full-strength cryptography world-wide. OpenCA is based on many Open-Source Projects. Among the supported software is OpenLDAP, OpenSSL, Apache Project, Apache mod_ssl.

(Machine Translation)
LastUpdate: 2007-12-13 11:22

grsecurity

grsecurity is a complete security system for Linux 2.4 and 2.6 that implements a detection/prevention/containment strategy. It prevents most forms of address space modification, confines programs via its Role-Based Access Control system, hardens syscalls, provides full-featured auditing, and implements many of the OpenBSD randomness features. It was written for performance, ease-of-use, and security. The RBAC system has an intelligent learning mode that can generate least privilege policies for the entire system with no configuration. All of grsecurity supports a feature that logs the IP of the attacker that causes an alert or audit.

LastUpdate: 2010-07-13 22:27

FreeRADIUS

FreeRADIUS is a high-performance, highly configurable, and feature-rich RADIUS server. Supported features include EAP (wireless authentication, PEAP, TTLS), MySQL, PostgreSQL, Oracle, LDAP, X9.9 token cards, VMPS, and many more. It comes with more than 50 vendor dictionaries, and interoperates with many others. It is the only open source RADIUS server that has implemented EAP, and it is currently deployed in multiple million-user systems.

LastUpdate: 2013-04-11 06:28

Openwall GNU/*/Linux

Owl (Openwall GNU/*/Linux) is a small security-enhanced Linux distribution for servers. Owl also makes a good base system for customized virtual machine images and embedded systems, and Owl live CDs with remote SSH access are good for recovering or installing systems (whether with Owl or not). A single Owl CD includes the full live system, installable packages, the installer program, as well as full source code and the build environment capable of rebuilding the entire system from source. Owl supports multiple architectures (x86, x86-64, SPARC, and Alpha) and offers some compatibility for packages developed for other Linux distributions. The primary approaches to security are proactive source code review, privilege reduction, privilege separation, careful selection of third-party software, safe defaults, and "hardening" to reduce the likelihood of successful exploitation of security flaws.