Reginout Key
KDBEdit is a key database editor for Elektra project. Elektra is a universal hierarchical configuration store, similar to (but better then) GConf and the Windows Registry. It allows programs to read and save their configurations with a consistent API, and allows them to be aware of other...
Platforms: *nix
License: Freeware | Size: 133.12 KB | Download (101): KDBEdit Download |
Crypt::DH is a Diffie-Hellman key exchange system. SYNOPSIS use Crypt::DH; my $dh = Crypt::DH->new; $dh->g($g); $dh->p($p); ## Generate public and private keys. $dh->generate_keys; $my_pub_key = $dh->pub_key; ## Send $my_pub_key to "other" party, and receive "other" ## public key...
Platforms: *nix
License: Freeware | Size: 18.43 KB | Download (94): Crypt::DH Download |
LogDog is a tool that monitors messages passing through syslogd and takes action based on key words and phrases. LogDog has a configuration file which allows you to specify a list of key words or phrases to alert on, and a list of commands that can be run when those words are encountered.....
Platforms: *nix
License: Freeware | Size: 15.36 KB | Download (99): LogDog Download |
stickystatus is a small program that displays the sticky and mouse key status in a popup image. The image disappears when no sticky or mouse keys are pressed. It is fully configurable: custom images, popup location, characters used for each key, position of characters, font used, and color of...
Platforms: *nix
License: Freeware | Size: 27.65 KB | Download (88): stickystatus Download |
KeysID project is a highly configurable linux daemon which lets you intercept keyboard key press and make them execute the programs you want. Its thought for laptop and multimedia keyboards, which usually have more keys than standard keyboards, but it works with all the keys. Installation:...
Platforms: *nix
License: Freeware | Size: 11.26 KB | Download (96): KeysID Download |
HTML_QuickForm_LiveText project is custom HTML_QuickForm element implemented as an input text that intercepts key presses to perform a query via AJAX and then shows the result. When a result line is selected, its value fills the input text and optionally other HTML elements, based on result...
Platforms: *nix
License: Freeware | Size: 24.58 KB | Download (97): HTML_QuickForm_LiveText Download |
Wepdecrypt is a Wireless LAN Tool written in c which guesses WEP Keys based on a active dictionary attack, key generator, distributed network attack and some other methods, Wepdecrypt based on wepattack and GPL licensed.. Official WepDecrypt's page
Platforms: *nix
License: Freeware | Size: 92.16 KB | Download (213): Wepdecrypt Download |
IDX-PKI is an Open Source implementation of a Public Key Infrastructure which aims to be IETF compliant for PKIX recommendation. IDX-PKI is very used by companies and public agencies.. OPENTRUST.COM - Building Trusted Ecosystems or End to End Security
Platforms: *nix
License: Freeware | Size: 604.16 KB | Download (123): DX-PKI Download |
IKEv2 provides an implementation of the Internet Key Exchange protocol version 2. IKEv2 is an implementation of the Internet Key Exchange protocol version 2. It is still in development, and currently targeted/developed on Fedora Core 3. Other Unix-like operating system are left for a later...
Platforms: *nix
License: Freeware | Size: 522.24 KB | Download (115): IKEv2 1.0 / 2.0 Alpha Download |
wmxkb showns and controls XKB groups (XFree86 key maps). It can be used as a dockable/swallowed applet with Window Maker, BlackBox and clones (incl. FluxBox), or any window manager that supports swallowing, including gnome-1, kde(kpanel)-1, afterstep, fvwm and clones. Alternatively, you can...
Platforms: *nix
License: Freeware | Size: 194.56 KB | Download (91): wmxkb Download |
Zfone uses a new protocol called ZRTP, which is better than the other approaches to secure VoIP, because it achieves security without reliance on a PKI, key certification, trust models, certificate authorities, or key management complexity that bedevils the email encryption world. Zfone also...
Platforms: *nix
License: Freeware | Size: 2 MB | Download (405): Zfone Download |
Search::Dict is a Perl module to search for key in dictionary file. SYNOPSIS use Search::Dict; look *FILEHANDLE, $key, $dict, $fold; use Search::Dict; look *FILEHANDLE, $params; Sets file position in FILEHANDLE to be first line greater than or equal (stringwise) to $key. Returns the new...
Platforms: *nix
License: Freeware | Size: 12.2 MB | Download (100): Search::Dict Download |
EasyEclipse packages together the Eclipse IDE and key open source plug-ins. EasyEclipse project is intended to make Eclipse easier to download, install, and use. Whats New in This Release: - Three distributions are now available: Expert Java, Plugin Warrior, and C and C++. Not all plugins...
Platforms: *nix
License: Freeware | Download (98): EasyEclipse Download |
gtkctrlaltdel is a small GTK+ frontend to CTRL ALT DEL key kombination. You no longer have to remember the combination to reset your computer, just launch gtkctrlaltdel and select the keys in an easy and user friendly environment. Installing: 1) look at Makefile 2) type make This should...
Platforms: *nix
License: Freeware | Size: 4.1 KB | Download (88): gtkctrlaltdel Download |
SYNOPSIS ###### # Subroutine interface # use Data::Startup qw(config override); $options = override(%default_options, @option_list ); $options = override(%default_options, @option_list ); $options = override(%default_options, %option_list ); @options_list = config(%options ); ($key,...
Platforms: *nix
License: Freeware | Size: 74.75 KB | Download (101): Data::Startup Download |
Welcome to the world of Fuzzy Fingerprinting, a new technique to attack cryptographic key authentication protocols that rely on human verification of key fingerprints. It is important to note that while fuzzy fingerprinting is an attack against a protocol, it is not a cryptographic attack and...
Platforms: *nix
License: Freeware | Size: 204.8 KB | Download (128): THC-FuzzyFingerprint Download |
xor-analyze provides a program for cryptanalyzing xor "encryption" with variable key length.. Thomas Habets useful programs
Platforms: *nix
License: Freeware | Size: 26.62 KB | Download (165): xor-analyze Download |
Wireless Key Generator is for generating wep security keys for wireless routers and access points. To use launch Wireless Key Generator. Then simply select bit size and mode and click onto the Generate button. Once generated save the keys to a text file, burn to CD, and use the CD to copy one of...
Platforms: Mac
License: Freeware | Download (686): Wireless Key Generator Download |
When you start Regedit, it automatically opens the last key that was viewed. If you wish to jump to a particular registry key directly without navigating the paths manually, you may use Free Registry Jump. Free Registry Jump enable you to jump to a certain registry key or value instantly. You can...
Platforms: Windows, Windows 7
License: Freeware | Size: 384.5 KB | Download (117): Free Registry Jump Download |
NTRU was specially designed as a public key cryptosystem that is thought to be unbreakable even with quantum computers.
Commonly used cryptosystems like RSA or ECC, on the other hand, will be broken if and when quantum computers become available. In addition, NTRU is significantly faster than...
Platforms: Windows
License: Freeware | Download (419): NTRU Download |