Ports Search

Results 411420 of 1,385 for /security/.(0.002 seconds)
security/lsh-2.1 (Score: 0.08339406)
Secure (encrypted) remote shell compatible with ssh 2
lsh is a client that can connect to the corresponding lshd server. It uses the SECSH protocol, which means that it is compatible with SSH 2.0, except for file transfer, which is not part of SECSH. SECSH uses compression and encryption algorithms that are unencumbered, and lsh itself is GPL. lsh is not as feature-rich as OpenSSH, as it doesn't currently support password-protected keyrings, the SSH 1.X protocols, TCP wrappers, etc. On the other hand, it doesn't require OpenSSL, and doesn't take a lot of work to avoid patented algorithms. Port author's notes on usage and common problems can be found at
security/libgringotts-1.2.1 (Score: 0.08339406)
Library for encapsulating/safekeeping data in encrypted/compressed form
libGringotts is a small, easy-to-use, thread-safe C library originally developed for Gringotts; its purpose is to encapsulate data (generic: ASCII, but also binary data) in an encrypted and compressed structure, to be written in a file or used elseway. It makes use of strong encryption algorithms, to ensure the data are as safe as possible, and allow the user to have the complete control over all the algorithms used in the process. For encryptions, libGringotts makes use of the MCrypt and MHash libs by Nikos Mavroyanopoulos.
security/libident-0.32 (Score: 0.08339406)
Small library to interface the ident protocol server (rfc1413)
COPYRIGHT ISSUES: This version of 'libident' is hereby released into the Public Domain. It may be distributed for a fee or without a fee. We only ask you not to pretend you wrote it. If you make any changes, please send sources or a diff of it to us (pen@lysator.liu.se or pell@lysator.liu.se), so we can keep _one_ unified version of libident available... COMMENTS: This is the second stab at a small library to interface to the Ident protocol server. Maybe this will work correctly on some machines.. :-) The ident-tester.c file is a small daemon (to be started from Inetd) that does an ident lookup on you if you telnet into it. Can be used to verify that your Ident server is working correctly. I'm currently running this "ident-tester" on port 114 at lysator.liu.se (130.236.254.1) if you wish to test your server.
security/libkpass-5 (Score: 0.08339406)
Library for a reading/writing KeePass 1.x DB
Libkpass is a from-scratch C implementation of reading and writing KeePass 1.x format password databases.
security/l0pht-watch-1.1 (Score: 0.08339406)
Program to report on what goes on in /tmp
This program watches over file creations and deletions in /tmp. Use it to see how secure and predictable your favourite OS/applications are.
security/libksba-1.3.4 (Score: 0.08339406)
KSBA is an X.509 Library
KSBA = rot13(digit_to_letter(x509)) to be pronounced as Kasbah KSBA is a library to make X.509 certificates as well as the CMS easily accessible by other applications. Both specifications are building blocks of S/MIME and TLS.
security/libotr-4.1.1 (Score: 0.08339406)
Portable OTR Messaging Library and toolkit
This is the library and toolkit for Off-the-Record Messaging used by the pidgin-otr plugin.
security/libotr-3.2.1 (Score: 0.08339406)
Portable OTR Messaging Library and toolkit
This is the library and toolkit for Off-the-Record Messaging used by the pidgin-otr plugin.
security/netpgp-20140220 (Score: 0.08339406)
PGP signing, verification, encryption, and decryption program
The netpgp command can digitally sign files and verify that the signatures attached to files were signed by a given user identifier. netpgp can also encrypt files using the public or private keys of users and, in the same manner, decrypt files which were encrypted. The netpgp utility can also be used to generate a new key-pair for a user. This key is in two parts, the public key (which can be used by other people) and a private key. In addition to these primary uses, the third way of using netpgp is to maintain keyrings. Keyrings are collections of public keys belonging to other users. By using other means of identification, it is possible to establish the bona fides of other users. Once trust has been established, the public key of the other user will be signed. The other user's public key can be added to our keyring. The other user will add our public key to their keyring.
security/libpwquality-1.2.4 (Score: 0.08339406)
Library for generating random passwords and quality checking
This is a libpwquality library for password quality checking and generation of random passwords that pass the checks.