Ports Search

Results 1,1411,150 of 1,385 for /security/.(0.003 seconds)
security/stud-0.4 (Score: 0.08339406)
Scalable TLS Unwrapping Daemon
stud is a network proxy that terminates TLS/SSL connections and forwards the unencrypted traffic to some backend. It's designed to handle 10s of thousands of connections efficiently on multicore machines.
security/subversion-1.9.4 (Score: 0.08339406)
Gnome KWyring integration for Version control system
Subversion is a version control system designed to be as similar to cvs(1) as possible, while fixing many outstanding problems with cvs(1). This port adds Gnome Keyring support to Subversion.
security/libssh2-1.4.2 (Score: 0.08339406)
Library implementing the SSH2 protocol (Linux CentOS 6.8)
security/pyotp-2.2.1 (Score: 0.08339406)
Python One Time Password Library
PyOTP is a Python library for generating and verifying one-time passwords. It can be used to implement two-factor (2FA) or multi-factor (MFA) authentication methods in web applications and in other systems that require users to log in.
security/sudoscript-2.1.2 (Score: 0.08339406)
Audited shells in Perl with sudo(8) and script(1)
Sudoscript provides an audited shell using sudo(8) and script(1). The front end script, sudoshell(1) contacts the daemon, sudoscriptd(8). They agree on the location of a FIFO, which the daemon opens for read. Sudoshell then runs script(1) with the FIFO as a typescript. The daemon stamps each line of the script(1) output with a session id, then passes the data over to another daemon. This daemon timestamps the data and stores it in a log file which is /var/log/sudoscript. This daemon also keeps an eye on the size of log files, and forks a rotator/compressor when it exceeds 2 MBytes.
security/libtasn1-2.3 (Score: 0.08339406)
ASN.1 structure parser library
security/scrypt-0.8.0 (Score: 0.08339406)
Bindings for the scrypt key derivation function library
This is is a set of Python bindings for the scrypt key derivation function. Scrypt is useful when encrypting password as it is possible to specify a minimum amount of time to use when encrypting and decrypting. If, for example, a password takes 0.05 seconds to verify, a user won't notice the slight delay when signing in, but doing a brute force search of several billion passwords will take a considerable amount of time. This is in contrast to more traditional hash functions such as MD5 or the SHA family which can be implemented extremely fast on cheap hardware.
security/swatch-3.2.3 (Score: 0.08339406)
The Simple WATCHer and filter
SWATCH - The Simple WATCHer and filter Swatch is designed to monitor system activity. Swatch requires a configuration file which contains pattern(s) to look for and action(s) to do when each pattern is found.
security/switzerland-0.1.0 (Score: 0.08339406)
Test the integrity of communications over networks and firewalls
Switzerland is a tool for testing networks, ISPs, and firewalls developed by the Electronic Frontier Foundation (www.eff.org). It will spot IP packets which are forged or modified between clients, inform you, and give you copies of the modified packets.
security/yara-editor-0.1.5 (Score: 0.08339406)
Editor for yara rules
Editor for yara rules