Search data on a harddisk/partition/file, extract the part you are interested
in, and write it back after you modified it.
PeerSec Networks MatrixSSL is an embedded SSL implementation designed for
small footprint applications and devices. PeerSec Networks offers a fully
supported, commercial version as well as an open source version that is
available for download.
This program is intended to replace crypt(1), It supports all the
algorithms and modes in libmcrypt (BLOWFISH, TWOFISH, DES, TripleDES,
3-WAY, SAFER, LOKI97, GOST, RC2, RC6, MARS, IDEA, RIJNDAEL, SERPENT,
CAST, ARCFOUR and WAKE), and is compatibile with UNIX crypt(1) and
with des(1) from Solaris.
Horde Blowfish Encryption Library
Sshguard monitors services from their logging activity. It reacts to messages
about dangerous activity by blocking the source address with the local firewall.
Sshguard employs a clever parser that can recognize several logging formats at
once transparently (syslog, syslog-ng, metalog, multilog, raw messages), and
detects attacks for many services out of the box, including SSH, FreeBSD's
ftpd and dovecot. It can operate all the major firewalling systems, including
PF, netfilter/iptables, and IPFIREWALL/ipfw.
Sshguard has several relevant features like support for IPv6, whitelisting,
suspension, log message authentication. It is reliable, easy to set up and
demands very few resources to the system.
Subversion is a version control system designed to be as similar to cvs(1)
as possible, while fixing many outstanding problems with cvs(1).
This port adds KDE KWallet support to Subversion.
Horde_Share provides an interface to all shared resources a user
owns or has access to.
Libmhash is a library which implements some hash algorithms like
crc32, md5 and sha-1.
SSH key-based authentication is tried-and-true, but it lacks a true
Public Key Infrastructure for key certification, revocation and
expiration. Monkeysphere is a framework that uses the OpenPGP web of
trust for these PKI functions. It can be used in both directions: for
users to get validated host keys, and for hosts to authenticate users.
tthsum generates and checks TTH checksums (root of the THEX hash tree).
The Merkle Hash Tree is a hash construct that exhibits desirable properties for
verifying the integrity of files and file subranges in an incremental or
out-of-order fashion.
The tool uses the Tiger hash algorithm for both the internal and the leaf
nodes, and has an interface identical to md5sum.