Ports Search

Results 1,2011,210 of 1,385 for /security/.(0.003 seconds)
security/yubico-piv-tool-1.4.1 (Score: 0.08339406)
Yubico PIV tool
The Yubico PIV tool is used for interacting with the Privilege and Identification Card (PIV) application on a YubiKey. With it you may generate keys on the device, importing keys and certificates, and create certificate requests, and other operations. A shared library and a command-line tool is included.
security/yubikey-piv-manager-1.3.0 (Score: 0.08339406)
YubiKey PIV Manager
YubiKey PIV Manager Tool for configuring your PIV-enabled YubiKey.
security/zeronet-0.4.0 (Score: 0.08339406)
Decentralized websites using Bitcoin crypto and BitTorrent network
Open, free and uncensorable websites, using Bitcoin cryptography and BitTorrent network. Features: * Real-time updated sites * Namecoin .bit domains support * Easy to setup: unpack & run * Clone websites in one click * Password-less BIP32 based authorization: Your account is protected by the same cryptography as your Bitcoin wallet * Built-in SQL server with P2P data synchronization: Allows easier site development and faster page load times * Anonymity: Full Tor network support with .onion hidden services instead of IPv4 addresses * TLS encrypted connections * Automatic uPnP port opening * Plugin for multiuser (openproxy) support * Works with any browser/OS
security/tmux-cssh-20151014 (Score: 0.08339406)
ClusterSSH features using tmux, but not X11
tmux-cssh is simple POSIX shell script, which synchronizes interactive shell commands over tmux sessions, making it useful for working on cluster nodes. It offers similar functionality to ClusterSSH, but without depending on X11.
security/trousers-0.3.13 (Score: 0.08339406)
Open-source TCG Software Stack
TrouSerS is an CPL (Common Public License) licensed Trusted Computing Software Stack. It is mostly compliant with the TSS 1.2 specification.
security/truecrack-0.1 (Score: 0.08339406)
Password cracker for TrueCrypt volumes
TrueCrack is a brute-force password cracker for TrueCrypt (Copyright) volume files. It works on Linux and it is optimized with Nvidia Cuda technology. It works with cripted volumes with the following algorithms: - PBKDF2 (defined in PKCS5 v2.0) based on RIPEMD160 Key derivation function. - XTS block cipher mode of operation used for hard disk encryption based on AES. TrueCrack can work in two different modes of use: - Dictionary attack: read the passwords from a file of words (one password for line). - Charset attack: generate the passwords from a charset of symbols defined by the user (for example: all possible strings of n characters from the charset "abc" ).
security/vnccrack-1.0.0 (Score: 0.08339406)
Fast offline password cracker for VNC passwords
VNCcrack is a fast offline password cracker for VNC passwords. By sniffing a VNC challenge-response sequence off the network (typically when VNC is used without a decent cryptographic wrapper like SSH or SSL), you can recover the password fairly easily and quickly by letting VNCcrack pound on it.
security/webfwlog-1.01 (Score: 0.08339406)
Web-based firewall log analyzer
Webfwlog is a flexible web-based analysis and reporting tool for firewall logs. It supports log files in standard ipfilter or ipfw format. With Webfwlog you can design reports to use on your firewall logs in whatever configuration you desire. Included are example reports as a starting point. You can sort a report with a single click, "drill-down" on the reports all the way to the packet level, and save your reports for later use. You can also create a link directly to any saved report. Webfwlog requires a web server with PHP support and a MySQL or PostgresSQL database server.
security/wpa_supplicant-2.5 (Score: 0.08339406)
Supplicant (client) for WPA/802.1x protocols
wpa_supplicant is a client (supplicant) with support for WPA and WPA2 (IEEE 802.11i / RSN). It is suitable for both desktop/laptop computers and embedded systems. Supplicant is the IEEE 802.1X/WPA component that is used in the client stations. It implements key negotiation with a WPA Authenticator and it controls the roaming and IEEE 802.11 authentication/ association of the wlan driver. wpa_supplicant is designed to be a "daemon" program that runs in the background and acts as the backend component controlling the wireless connection. wpa_supplicant supports separate frontend programs and a text-based frontend (wpa_cli) and a GUI (wpa_gui) are included with wpa_supplicant.
security/xinetd-2.3.15 (Score: 0.08339406)
Replacement for inetd with better control and logging
Xinetd is a replacement for inetd, the internet services daemon. Xinetd is not just an inetd replacement. Anybody can use it to start servers that don't require privileged ports because xinetd does not require that the services in its configuration file be listed in /etc/services. Its configuration file has a different format than inetd's one and it understands different signals. However the signal-to-action assignment can be changed.