Ports Search

Results 9,6919,700 of 17,754 for %E6%8E%A7%E5%88%B6%E5%8F%B0.(0.011 seconds)
security/rsa-3.3 (Score: 7.770591E-5)
Pure-Python RSA implementation
Python-RSA is a pure-Python RSA implementation. It supports encryption and decryption, signing and verifying signatures, and key generation according to PKCS#1 version 1.5.
security/signedjson-1.0.0 (Score: 7.770591E-5)
Sign JSON with Ed25519 signatures
python-signedjson allows more than one entity to sign an object, can sign with more than one key and replace ED25519 with a different algorithm.
security/rhash-1.3.3 (Score: 7.770591E-5)
Utility and library for computing and checking of file hashes
RHash is a console utility and library for computing and verifying hash sums of files. It supports CRC32, MD4, MD5, SHA1, SHA256, SHA512, SHA3, Tiger, TTH, Torrent BTIH, AICH, ED2K, GOST R 34.11-94, RIPEMD-160, HAS-160, EDON-R 256/512, Whirlpool, and Snefru-128/256 hash sums. Its features are: * Can calculate Magnet links * Output in a predefined (SFV, BSD-like) or a user-defined format * Ability to process directories recursively * Updating existing hash-files (adding hash sums of files missing in a hash-file) * Portable, written in pure C, small in size, open source (MIT license) Perl wrapper is available as `security/p5-Crypt-RHash' port.
security/camellia-1.2 (Score: 7.770591E-5)
Ruby extension library which implements Camellia encryption
This is a Camellia package for Ruby. Camellia engine is implemented in "C". Supported key length : 128bit/192bit/256bit Supported modes of operation : ECB/CFB/CBC
security/twofish-0.7 (Score: 7.770591E-5)
Twofish cryptographic module for Python
A pure python implementation of the Rijndael encryption algorithm. Useful for quick string encryption in python programs but probably is not fast enough for anything too big.
security/sancp-1.6.1 (Score: 7.770591E-5)
Network connection profiler
Sancp is a network security tool designed to collect statistical information regarding network traffic, as well as, collect the traffic itself in pcap format, all for the purpose of: auditing, historical analysis, and network activity discovery. Rules can be used to distinguish normal from abnormal traffic and support tagging connections with: rule id, node id, and status id. From an intrusion detection standpoint, every connection is an event that must be validated through some means. Sancp uses rules to identify, record, and tag traffic of interest. 'Tagging' a connection is a new feature since v1.4.0 Connections ('stats') can be loaded into a database for further analysis.
security/pks-0.9.6.20040312 (Score: 7.770591E-5)
PGP Public Key Server
This program implements a standard PGP Key Server, which can be assumed to be in addition to the public key server at MIT.
security/spybye-0.3 (Score: 7.770591E-5)
Web proxy to detect malware
SpyBye is a tool to help web masters determine if their web pages are hosting browser exploits that can infect visiting users with malware. It functions as an HTTP proxy server and intercepts all browser requests. SpyBye uses a few simple rules to determine if embedded links on your web page are harmlesss, unknown or maybe even dangerous. SpyBye analyzes all downloads in the background and provides you with a warning notification whenever it encounters content that is potentially malicious. At that point, you can click on the link in the notification and receive a more detailed analysis of the web page.
security/stoken-0.6 (Score: 7.770591E-5)
Software Token for UNIX compatible with RSA SecurID
Stoken is an open source tokencode generator compatible with RSA SecurID 128-bit (AES) tokens. It is a hobbyist project, not affiliated with or endorsed by RSA Security.
security/tsshbatch-1.228 (Score: 7.770591E-5)
Batch SSH operations
'tsshbatch' is a tool to enable you to issue a command to many servers without having to log into each one separately. When writing scripts, this overcomes the 'ssh' limitation of not being able to specify the password on the command line. 'tsshbatch' also understands basic 'sudo' syntax and can be used to access a server, 'sudo' a command, and then exit. 'tsshbatch' thus allows you to write complex, hands-off scripts that issue commands to many servers without the tedium of manual login and 'sudo' promotion. System administrators, especially, will find this helpful when working in large server farms.