Ports Search

Results 3,5613,570 of 5,824 for /net/.(0.004 seconds)
security/ossec-hids-2.8.3 (Score: 0.01987111)
Security tool to monitor and check logs and intrusions
OSSEC is an Open Source Host-based Intrusion Detection System. It performs log analysis, integrity checking, Windows registry monitoring, rootkit detection, time-based alerting and active response.
security/axTLS-1.4.9 (Score: 0.01987111)
SSL/TLS client/server library implementation
The axTLS project is an SSL client/server library using the TLSv1 protocol. It is designed to be small and fast, and is suited to embedded projects. A web server is included.
security/base-1.4.5 (Score: 0.01987111)
Basic Analysis and Security Engine - analyzing Snort alerts
BASE is the Basic Analysis and Security Engine. It is based on the code from the ACID project. This application provides a PHP-based web front-end to query and analyze the alerts coming from a Snort IDS system. BASE is a web interface to perform analysis of intrusions that Snort has detected on your network. It uses a user authentication and role-base system, so that you as the security admin can decide what and how much information each user can see. It also has a simple to use, web-based setup program for people not comfortable with editing files directly.
security/ccrypt-1.10 (Score: 0.01987111)
Command-line utility for encrypting and decrypting files and streams
ccrypt is a utility for encrypting and decrypting files and streams. It was designed to replace the standard Unix crypt utility, which is notorious for using a very weak encryption algorithm. ccrypt is based on the Rijndael cipher, which is the U.S. government's chosen candidate for the Advanced Encryption Standard (AES, see http://www.nist.gov/aes/). This cipher is believed to provide very strong security. Unlike Unix crypt, the algorithm provided by ccrypt is not symmetric, i.e., one must specify whether to encrypt or decrypt. The most common way to invoke ccrypt is via the commands ccencrypt and ccdecrypt. There is also a ccat command for decrypting a file directly to the terminal, thus reducing the likelihood of leaving temporary plaintext files around. In addition, there is a compatibility mode for decrypting legacy Unix crypt files. Encryption and decryption depends on a keyword (or key phrase) supplied by the user. By default, the user is prompted to enter a keyword from the terminal. Keywords can consist of any number of characters, and all characters are significant (although ccrypt internally hashes the key to 256 bits). Longer keywords provide better security than short ones, since they are less likely to be discovered by exhaustive search.
security/ccsrch-1.0.3 (Score: 0.01987111)
Is a tool that searches for credit card numbers (PAN) and track data
ccsrch is a tool that searches for and identifies unencrypted and contiguous credit card numbers (PAN) and track data on Windows and UNIX operating systems. It will also identify the location of the PAN data in the files and record MAC times.
security/ckpass-0.2 (Score: 0.01987111)
Ncurses based password database client
An ncurses based password database client that is compatible with KeePass 1.x format databases.
security/aescrypt-0.7 (Score: 0.01987111)
Command-line AES encryption/decryption suite
From the aescrypt README.html: This is a program for encrypting/decrypting streams of data using Rijndael and Cipher Block Feedback mode (CFB-128). ... 5. This program was deliberately kept extremely simple. It is not intended to be a full encryption solution, it is intended to be used within scripts as part of a complete solution. Keychain management, public key signatures, etc. are all expected to be done external to this program.
security/blindelephant-1.0 (Score: 0.01987111)
Fingerprint the web applications used by a web site
The BlindElephant Web Application Fingerprinter attempts to discover the version of a (known) web application by comparing static files at known locations against precomputed hashes for versions of those files in all available releases. The technique is fast, low-bandwidth, non-invasive, generic, and highly automatable.
security/botan-1.10.13 (Score: 0.01987111)
Portable, easy to use, and efficient C++ crypto library
Botan is a crypto library written in C++. It provides a variety of cryptographic algorithms, including common ones such as AES, MD5, SHA, HMAC, RSA, Diffie-Hellman, DSA, and ECDSA, as well as many others that are more obscure or specialized. It also offers X.509v3 certificates and CRLs, and PKCS #10 certificate requests. A message processing system that uses a filter/pipeline metaphor allows for many common cryptographic tasks to be completed with just a few lines of code. Assembly optimizations for common CPUs, including x86, x86-64, and PowerPC, offers further speedups for critical tasks such as SHA-1 hashing and multiple precision integer operations. Botan is licensed under the same permissive terms as FreeBSD itself.
security/bsdsfv-1.18 (Score: 0.01987111)
Flexible SFV checksum utility
BSDsfv is a flexible and highly compatible SFV checksum utility. Features: - create SFV files, verify downloaded single files or whole releases - add banners to your SFV files - very flexible and compatible with all other SFV tools currently known, including SFVNIX compatibility mode concerning SFV files created - easy to console application - plug & play support for glFTPd and other demons including count-missing-files feature for race scripts