Search: Home Bugtraq Vulnerabilities Mailing Lists Security Jobs Tools
(Page 1 of 51)   1 2 3 4 5 6 7 8 9 10 11  Next >

Category: Cryptography

Izemail
Added 2006-02-22
by Izecom
Encrypt and sign your e-mail messages, just by pressing the Send button in your e-mail program with Izemail. No need to exchange encryption keys or certificates, no need to go through complex enrollment procedures. The program allows you to send an encrypted and signed message, and all you need to know is their e-mail address. This program uses widespread standards for e-mail encryption such as S/MIME and PKI, making it compatible with any technology that supports S/MIME or PKI. It can read, decrypt and verify messages sent by these other systems. This program takes your message, encrypts it and delivers it to the recipient. If recipient doesn't already have an encryption key, the program makes sure they get one. Also, the software can use X.509 certificates issued by any CA that complies with PKI standards. It does not require you to use Izemail certificates.

Elcomsoft Distributed Password Recovery
Added 2006-02-15
by ElcomSoft Co.Ltd.
Elcomsoft Distributed Password Recovery (EDPR) offers administrators a comprehensive solution for recovering passwords to Microsoft Office documents when employees forget or lost their passwords. EDPR lets you coordinate all of the unused computing power of every computer on your LAN or WAN, and use distributed processing to restore the lost password by installing the "agents" onto as many computers on the network as the user desires; each of these agents uses brute force to try to recover the lost password. EDPR restores passwords for Word and Excel documents encrypted with 40 bit keys (Office 97/2000 compatible) as well as more recent documents (Office XP/2003) encrypted with CSP. Office 97/2000 documents can be also decrypted by recovery of encryption keys instead of password, and that type of attack gives a guaranteed result regardless of password length and complexity.

Steganos LockNote
Added 2006-01-26
by Steganos GmbH
This open source software enables users to quickly and easily protect confidential notes, passwords, addresses, phone numbers or other sensitive information. LockNote looks and acts like a normal text file; however, it can only be opened with a password chosen by the user. The encrypted memo can be saved to a USB stick and used while on the road or on another PC. Like all other Steganos encryption products, LockNote employs 256-bit AES encryption. Since the freeware’s encryption and decryption mechanisms are integrated within the file, any encrypted data is saved within the program itself; thus, nothing needs to be installed, and there's no traditional software interface. After downloading the 300 KB program, the user simply opens it, types up the desired memo and selects a password. The next time the user wants to open the memo, he or she just needs to type in the password, and the data will appear. It is also possible to create a LockNote from a pre-existing text file by simply dragging and dropping the file onto a LockNote window. The file will be encrypted automatically. The software enables users to create as many LockNotes as desired, and they can be sent as e-mail attachments. Since LockNotes are executable files (exe format), it may be necessary to utilize WinZip to send a LockNote attachment in order to pass through certain mail filters. To provide maximum security on the road, LockNotes can be saved to storable media like USB sticks, thus enabling users to safely and easily transport important customer information, addresses or telephone numbers. A LockNote saved to a USB stick can be opened on any PC by entering the password. Then, the user can add more confidential notes, close the LockNote and remove the USB stick. The data will be securely encrypted.

SafeBit Disk Encryption
Added 2006-01-09
by NeoByte Solutions
SafeBit Disk Encryption is the perfect electronic vault you need for your privacy. It features on-the-fly AES encryption, by creating virtual encrypted disk drives, where you can hide files and folders, keep them encrypted all them time, but still work with them just like you work with normal files. Data is decrypted automatically during the transfer from disk to memory, and re-encryted when data is written back to disk. This process is transparent to the user. SafeBit Disk Encryption maintains the security of data even in case of incorrect system shutdown or system crash by keeping the files always encrypted. Container files are protected against accidental deletion. Security is increased also by the "automatic closure system" and emergency hotkeys. Safebit is the perfect suplement to a firewall and antivirus program, and stands as the last line of defense in case these fail. Nothing can crack the strong 256-bit AES encryption SafeBit uses (selected by the U.S. government as its official encryption standard). SafeBit has a very intuitive user interface which makes it friendly for computer beginners and also powerful for experienced IT experts that search for a reliable file encryption solution. It will protect your confidential information from your boss, wife, kids, friends, hackers, competitors, secret services or from any other possible intruder. SafeBit will help you improve the security offered by an antivirus or a firewall. While your documents are inside the encrypted closed vault, viruses and trojans will not be able to infect your important files. Keep your documents inside the encrypted safe and hackers will NEVER be able to extract your files from the vault even if your firewall fails, because the strong AES encryption algorithm cannot be cracked. Laptops are extremely vulnerable to thefts. Using SafeBit you will be able to secure the important documents on your mobile computer against possible thefts. Protect yourself with SafeBit now!

Jipher
Added 2005-12-15
by Emmanouel Kellinis
Cryptanalysis tool that can be used to attack old ciphers. Additional can be used to analyse cookies. (Multi-threaded)

Steganos Safe Professional 2006
Added 2005-12-13
by Steganos GmbH
Steganos Safe Pro 2006 is a file encryption software product designed specifically for the SMB market. Based on Steganos' successful consumer market version, Steganos Safe 2006, the product enables users to securely store an unlimited amount of data on 64 GB virtual hard drives. The Pro version, however, enables these drives to be mounted on a network. The secure drives can be opened by manually entering a password or attaching a password-holding mobile device like a USB stick. The software also provides Emergency Decryption Keys to access Safe contents if the original password gets lost. It also features the ability to securely transfer confidential data from one PC or laptop to another; file shredding capabilities and anti-crash protection.

Advanced Archive Password Recovery
Added 2005-10-04
by ElcomSoft Co.Ltd.
Advanced Archive Password Recovery is a program to recover lost or forgotten passwords for ZIP(PKZip/WinZip), ARJ/WinARJ, RAR/WinRAR and ACE/WinACE (1.x) archives. Supports the customizable "brute-force" attack, effectively optimized for speed (for traditional ZIP encryption, up to 15 million passwords per second on Pentium 4); dictionary-based attack, and very fast and effective known-plaintext attack. Supports strong WinZip encryption (AES). Multilangual interface is provided.

Secured eMail
Added 2005-09-27
by Secured eMail
Secured eMail encrypts your emails and attachments with just the click of a button. Seamlessly integrates with Microsoft Outlook. The software combines AES encryption with the generation of dynamic code keys. The recipient of the email downloads the free Reader version, which works with all email software as well as Web based email services.

SafeGuard Easy by Utimaco
Added 2005-09-14
by Utimaco Safeware
Total hard disk encryption using AES and Blowfish. Uses Pre-Boot Authentication for complete protection of your system

FreeSecurity
Added 2005-08-16
by João Gomes
A freeware application that allows you to use AES encryption to secure your files. FreeSecurity is developed in Java and requires only that your operating system has a Java Runtime Environment.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox







 

Privacy Statement
Copyright 2005, SecurityFocus