Ports Search

Results 15,69115,700 of 17,660 for descr%3A%22spam filter%22.(0.012 seconds)
security/Authen-PluggableCaptcha-0.05 (Score: 9.2782444E-5)
Pluggable Captcha framework for Perl
Authen::PluggableCaptcha is a fully modularized and extensible system for making Pluggable Catpcha (Completely Automated Public Turing Test to Tell Computers and Humans Apart) tests. Pluggable? All Captcha objects are instantiated and interfaced via the main module, and then manipulated to require various submodules as plug-ins. Authen::PluggableCaptcha borrows from the functionality in Apache::Session::Flex
security/Authen-SASL-Cyrus-0.13 (Score: 9.2782444E-5)
XS SASL Authentication
SASL is a generic mechanism for authentication used by several network protocols. Authen::SASL::Cyrus provides an implementation framework that all protocols should be able to share. The XS framework makes calls into the existing libsasl2.so shared library to perform SASL client connection functionality, including loading existing shared library mechanisms.
security/Business-PayPal-EWP-1.03 (Score: 9.2782444E-5)
Perl extension for PayPal Encrypted Website Payments
Business::PayPal::EWP - Perl extension for PayPal's Encrypted Website Payments with Encrypted Web Payments. It contains a single function, SignAndEncrypt which takes the plaintext form code, private key file, public key file, and PayPal's public certificate, and will return the signed and encrypted code needed by paypal.
security/Crypt-Dining-1.01 (Score: 9.2782444E-5)
The Dining Cryptographers' Protocol
The dining cryptographers' protocol is documented in Bruce Schneier's book as a kind of "cryptographic ouija board". It works as follows: A number of cryptographers are dining at a circular table. At the end of the meal, the waiter is summoned and asked for the bill. He replies, "Thank you, sir. The bill has been paid." The cryptographers now have the problem of working out whether someone at the table paid the bill, or whether the NSA has paid it as some sort of veiled threat. The protocol proceeds. Each cryptographer flips a coin, and shows the result ONLY to the participant on his RIGHT. Each cryptographer then compares his coin with that on his LEFT, and raises his hand if they show different faces. If any participant paid the bill, he "cheats" and does the opposite, that is, he raises his hand if the coins show the same face. Now, the hands are counted. An odd number means that someone at the table paid the bill. An even number means that the NSA paid.
security/Crypt-OpenPGP-1.06 (Score: 9.2782444E-5)
Pure-Perl OpenPGP-compatible PGP implementation
Crypt::OpenPGP is a pure-Perl implementation of the OpenPGP standard[1]. In addition to support for the standard itself, Crypt::OpenPGP claims compatibility with many other PGP implementations, both those that support the standard and those that preceded it. Crypt::OpenPGP provides signing/verification, encryption/decryption, keyring management, and key-pair generation; in short it should provide you with everything you need to PGP-enable yourself. Alternatively it can be used as part of a larger system; for example, perhaps you have a web-form-to-email generator written in Perl, and you'd like to encrypt outgoing messages, because they contain sensitive information. Crypt::OpenPGP can be plugged into such a scenario, given your public key, and told to encrypt all messages; they will then be readable only by you. This module currently supports RSA and DSA for digital signatures, and RSA and ElGamal for encryption/decryption. It supports the symmetric ciphers 3DES, Blowfish, IDEA, Twofish, and Rijndael (AES). Rijndael is supported for key sizes of 128, 192, and 256 bits. Crypt::OpenPGP supports the digest algorithms MD5, SHA-1, and RIPE-MD/160. And it supports ZIP and Zlib compression.
security/Crypt-OpenSSL-CA-0.24 (Score: 9.2782444E-5)
Perl extension for OpenSSL CA API
Crypt-OpenSSL-CA - Model of an X509v3 Certification Authority This package performs the cryptographic operations necessary to issue X509 certificates and certificate revocation lists (CRLs). It is implemented as a Perl wrapper around the popular OpenSSL library. All certificate and CRL extensions supported by OpenSSL are available, and then some.
security/Crypt-Serpent-1.01 (Score: 9.2782444E-5)
Perl implementation of the Serpent encryption algorithm
Serpent was designed by Ross Anderson, Eli Biham and Lars Knudsen as a candidate for the Advanced Encryption Standard. It has been selected as one of the five finalists in the AES competition. Serpent is faster than DES and more secure than Triple DES. It provides users with a very high level of assurance that no shortcut attack will be found. To achieve this, the algorithm's designers limited themselves to well understood cryptography mechanisms, so that they could rely on the wide experience and proven techniques of block cipher cryptanalysis. The algorithm uses twice as many rounds as are necessary to block all currently known shortcut attacks. This means that Serpent should be safe against as yet unknown attacks that may be capable of breaking the standard 16 rounds used in many types of encryption today. However, the fact that Serpent uses so many rounds means that it is the slowest of the five AES finalists. But this shouldn't be an issue because it still outperforms Triple DES. The algorithm's designers maintain that Serpent has a service life of at least a century.
security/Crypt-Twofish2-1.02 (Score: 9.2782444E-5)
Perl implementation of the Twofish encryption algorithm
This module implements the twofish cipher in a less braindamaged (read: slow and ugly) way than the existing "Crypt::Twofish" module. Although it is "Crypt::CBC" compliant you usually gain nothing by using that module (except generality), since "Crypt::Twofish2" can work in either ECB or CBC mode.
security/chrootuid-1.3 (Score: 9.2782444E-5)
Simple wrapper that combines chroot(8) and su(1) into one program
The chrootuid command combines chroot(8) and su(1) into one program, so that there is no need to have commands such as /usr/bin/su in the restricted environment. Access to the file system is restricted to the newroot subtree and privileges are restricted to those of the newuser account (which must be a known account in the unrestricted environment). See also jail(8)
security/nss-3.27 (Score: 9.2782444E-5)
Libraries to support development of security-enabled applications
Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled server applications. Applications built with NSS can support SSL v2 and v3, TLS, PKCS #5, PKCS #7, PKCS #11, PKCS #12, S/MIME, X.509 v3 certificates, and other security standards.