Ports Search

Results 15,70115,710 of 17,660 for descr%3A%22spam filter%22.(0.013 seconds)
security/Digest-MD5-Reverse-1.3 (Score: 9.2782444E-5)
Perl extension that looks for MD5 hashes in several databases
MD5 sums (see RFC 1321 - The MD5 Message-Digest Algorithm) are used as a one-way hash of data. Due to the nature of the formula used, it is impossible to reverse it. This module provides functions to search several online MD5 hashes database and return the results (or return undefined if no match found).
security/Digest-Pearson-PurePerl-1.00 (Score: 9.2782444E-5)
Perl extension for Peter K. Pearson's hash algorithm in pure Perl
Digest::Pearson::PurePerl is an implementation of Peter K. Pearson's hash algorithm presented in "Fast Hashing of Variable Length Text Strings" - ACM 1990. This hashing technique yields good distribution of hashed results for variable length input strings on the range 0-255, and thus, it is well suited for data load balancing. If you prefer a fast implementation, you might want to consider Digest::Pearson instead.
security/Digest-Perl-MD4-1.4 (Score: 9.2782444E-5)
Perl extension for MD4 hash algorithm in pure Perl
This is not C-code interface (like `Digest::MD5') but a Perl-only implementation of MD4 (like `Digest::Perl::MD5'). Because of this, it is slow but avoids platform specific complications. For efficiency you should use `Digest::MD4' instead of this module if it is available.
Passphrases and Passwords as objects for Dancer
Dancer::Plugin::Passphrase manages the hashing of passwords for Dancer apps, allowing developers to follow cryptography best practices without having to become a cryptography expert. It uses the bcrypt algorithm as the default, while also supporting any hashing function provided by Digest.
Passphrases and Passwords as objects for Dancer2
Dancer2::Plugin::Passphrase manages the hashing of passwords for Dancer apps, allowing developers to follow cryptography best practices without having to become a cryptography expert. It uses the bcrypt algorithm as the default, while also supporting any hashing function provided by Digest.
security/Digest-DMAC-1.1.4 (Score: 9.2782444E-5)
Perl5 interface to DMAC Double Message-Digest Algorithms
This is Encrypted MAC (EMAC), formerly known as Double MAC (DMAC). Unlike HMAC, which reuses an existing one-way hash function, such as MD5, SHA-1 or RIPEMD-160, EMAC reuses an existing block cipher to produce a secure message authentication code (MAC). Using the block cipher, a message is encrypted in CBC mode. The last block is taken as the MAC of the message. For fixed-length messages, this method is provably secure. In reality, however, messages have arbitrary lengths, and this method is not secure. To make secure MACs for variable length messages, the last block is encrypted once again with a different key. The security of this construction has been proved in the paper, ``CBC MAC for Real-Time Data Sources'' by Erez Petrank and Charles Rackoff. The security can be proved on the assumption that the underlying block cipher is pseudo-random. The performance and key-agility of EMAC are reasonable. EMAC is preferable for short messages because the block length is smaller compared to the schemes based on a hash function. EMAC is also chosen as one of the NESSIE winners for Message Authentication Codes, along with UMAC, TTMAC and HMAC. The current NESSIE specification chooses the AES as block cipher.
security/Digest-EMAC-1.2 (Score: 9.2782444E-5)
Perl5 interface to EMAC Double Message-Digest Algorithms
This is Encrypted MAC (EMAC), formerly known as Double MAC (DMAC). Unlike HMAC, which reuses an existing one-way hash function, such as MD5, SHA-1 or RIPEMD-160, EMAC reuses an existing block cipher to produce a secure message authentication code (MAC). Using the block cipher, a message is encrypted in CBC mode. The last block is taken as the MAC of the message. For fixed-length messages, this method is provably secure. In reality, however, messages have arbitrary lengths, and this method is not secure. To make secure MACs for variable length messages, the last block is encrypted once again with a different key. The security of this construction has been proved in the paper, ``CBC MAC for Real-Time Data Sources'' by Erez Petrank and Charles Rackoff. The security can be proved on the assumption that the underlying block cipher is pseudo-random. The performance and key-agility of EMAC are reasonable. EMAC is preferable for short messages because the block length is smaller compared to the schemes based on a hash function. EMAC is also chosen as one of the NESSIE winners for Message Authentication Codes, along with UMAC, TTMAC and HMAC. The current NESSIE specification chooses the AES as block cipher.
security/GD-SecurityImage-1.73 (Score: 9.2782444E-5)
Perl5 module for creating CAPTCHA security images
This module gives you a basic interface to create CAPTCHAs (Completely Automated Public Turing Test to Tell Computers and Humans Apart) also known as "Security Images". The final output is the actual graphic data, the mime type of the graphic and the created random string.
security/kwalletmanager-4.14.3 (Score: 9.2782444E-5)
Password manager for KDE
KDE Wallet Manager is a tool to manage the passwords on your KDE system. By using the KDE wallet subsystem it not only allows you to keep your own secrets but also to access and manage the passwords of every application that integrates with the KDE wallet.
security/Nmap-Parser-1.31 (Score: 9.2782444E-5)
Parse nmap scan data with perl
This module implements a interface to the information contained in an nmap scan. It is implemented by parsing the xml scan data that is generated by nmap. This will enable anyone who utilizes nmap to quickly create fast and robust security scripts that utilize the powerful port scanning abilities of nmap.