Ports Search

Results 521530 of 1,385 for /security/.(0.004 seconds)
security/openvpn-2.3.12 (Score: 0.08339406)
Secure IP/Ethernet tunnel daemon, PolarSSL-based build
security/Authen-Captcha-1.024 (Score: 0.08339406)
Perl module to verify the human element in transactions
Authen::Captcha provides an object oriented interface to captcha file creations. Captcha stands for Compl etely Automated Public Turning test to tell Computers and Humans Apart. A Captcha is a program that can generate and grade tests that: - most humans can pass - current computer programs can't pass The most common form is an image file containing distorted text, which humans are adept at reading, and co mputers (generally) do a poor job. This module currently implements that method.
security/Authen-DecHpwd-2.006 (Score: 0.08339406)
Perl module for DEC VMS password hashing
This perl module implements the LGI$HPWD password hashing function from VMS, and some associated VMS username and password handling functions.
security/Authen-Htpasswd-0.171 (Score: 0.08339406)
Authen::Htpasswd - interface to read and modify Apache .htpasswd files
This module provides a convenient, object-oriented interface to Apache-style .htpasswd files. It supports passwords encrypted via MD5, SHA1, and crypt, as well as plain (cleartext) passwords. Additional fields after username and password, if present, are accessible via the extra_info array.
security/ossec-hids-2.8.3 (Score: 0.08339406)
The client port of ossec-hids
security/ossec-hids-2.8.3 (Score: 0.08339406)
The client and server (local) port of ossec-hids
security/digest-0.6.10 (Score: 0.08339406)
Create cryptographic hash digests of R objects
Implementation of a function 'digest()' for the creation of hash digests of arbitrary R objects (using the md5, sha-1, sha-256, crc32, xxhash and murmurhash algorithms) permitting easy comparison of R language objects, as well as a function 'hmac()' to create hash-based message authentication code. The md5 algorithm by Ron Rivest is specified in RFC 1321, the sha-1 and sha-256 algorithms are specified in FIPS-180-1 and FIPS-180-2, and the crc32 algorithm is described in ftp://ftp.rocksoft.com/cliens/rocksoft/papers/crc_v3.txt. For md5, sha-1, sha-256 and aes, this package uses small standalone implementations that were provided by Christophe Devine. For crc32, code from the zlib library is used. For sha-512, an implementation by Aaron D. Gifford is used. For xxHash, the implementation by Yann Collet is used. For murmurhash, an implementation by Shane Day is used. Please note that this package is not meant to be deployed for cryptographic purposes for which more comprehensive (and widely tested) libraries such as OpenSSL should be used.
security/Authen-NTLM-1.09 (Score: 0.08339406)
Perl5 NTLM authentication module
The NTLM (Windows NT LAN Manager) authentication scheme is the authentication algorithm used by Microsoft. NTLM authentication scheme is used in DCOM and HTTP environment. It is used to authenticate DCE RPC packets in DCOM. It is also used to authenticate HTTP packets to MS Web Proxy or MS Web Server. Currently, it is the authentication scheme Internet Explorer chooses to authenticate itself to proxies/web servers that supports NTLM.
security/Authen-OATH-1.0.0 (Score: 0.08339406)
OATH one time passwords implementation
The Authen::OATH module provides a Perl implementation of the HOTP and TOTP One Time Password algorithms as defined by OATH (http://www.openautentication.org).
security/Authen-PAAS-1.1.1 (Score: 0.08339406)
Perl Authentication & Authorization Service
The Authen::PAAS distribution provides a Perl API for authenticating and authorizing users of computing services. Its design is inspired by existing pluggable authentication services such as PAM and Java's JAAS, so people familiar with those two services should be comfortable with the concepts in Authen::PAAS. At its heart, Authen::PAAS provides a login service, with pluggable modules for performing different authentication schemes. The pluggable framework enables the system administrator, rather than the application developer to define what method is used to authentication with a particular application. One might ask, why not just use PAM directly via the existing Authen::PAM Perl bindings. While this works well for applications which wish to authenticate against real UNIX user accounts (eg FTP, Telnet, SSH), it is not particularly well suited to applications with 'virtualized' user accounts. For example, a web application may maintain a set of virtual user accounts in a database, or a chat server, may maintain a set of user accounts in a text configuration file. Since it merely delegates through to the underlying C libraries, the Authen::PAM module does not provide a convenient means to write new authentication schemes in Perl. Thus the Authen::PAAS distribution provides a pure Perl API for authentication.