Linux Video Camera and CCTV (close circuit TV) security and surveillance solution with Motion Detection also support web and semi-automatic control of Pan/Tilt/Zoom cameras using a variety of protocols.
dual-licensed implementation of SSL. It includes SSL client libraries and an SSL server implementation. It supports multiple APIs, including those defined by SSL and TLS. It also supports an OpenSSL compatibility interface.
a simple, fast offline-mode VNC password cracker. It takes a set of challenge-response pairs of the type passed during a VNC authentication attempt, and attempts to recover the passwords using a dictionary file.
a service that analyzes suspicious files and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware detected by antivirus engines.
The numbers that control your life. You're identified by dozens of numbers. Your phone number, your driver's license number, your social security number, your zip code, your license plate, your credit card numbers. I find these numbers fascinating. Who distributes them? What can they be used for? How can you use them? How are they issued?
a free software which enables users inside countries and other locals with heavy Internet censorship to visit any public web sites in the world safely and freely.
site to educate the American public about the law and technology of government surveillance in the United States, providing the information and tools necessary to evaluate the threat of surveillance and take appropriate steps to defend against it.
a software framework that allows for advanced sequence and protocol stream analysis by utilizing bioinformatics algorithms. The sole purpose of this software is to identify protocol fields in unknown or poorly documented network protocol formats.
a circle of cells with windows facing inwards, towards a tower, wherein jailers could look out and inspect the prisoners at any time, unseen by their subjects.
collects vulnerability data on every type of computer software and operating system. Like other open-source projects, the OSVDB depends on the wide expertise of its contributors to provide dependable information on many technologies and security
The men and women running SAC in 1960 essentially put the entire planet’s population at risk by deliberately disabling the PAL safety mechanisms. Perhaps we should keep that in mind before we put too much trust in the people charged with our nation’s
the prototype version of the KeeLogger with full documentation, electrical schematics, and program. Operation of this device is similar to the KeeLogger Pro version, although download is initiated by a special button.
a group of international experts involved in network and system security. THC was founded in 1995 in Germany, has published over 60 software releases and technical papers and currently is among the top ten security groups worldwide.
an application that lets you monitor TCP and UDP activity on your local system. It a powerful tool for tracking down network-related configuration problems and analyzing application network usage.
the Windows version of the UNIX 'tail -f' command. Used to monitor changes to files; displaying the changed lines in realtime. Uses a plugin architecture, which allows notifications to occur when certain keywords are detected in monitored files. MAPI
a collection of utilities and technical information related to Windows internals by Mark Russinovich and Bryce Cogswell. Microsoft acquired Sysinternals in July, 2006.
a script that uses brute force to crack passwords through "true/false" SQL injection vulnerabilities. With "true/false" SQL injection vulnerabilities, you cannot actually query data out of the database, only ask a statement that is returned "true" or "fal
by Huw Collingbourne. Covers a range of important topics from virus prevention to unauthorized data access. If you want to protect yourselves from the bad guys
project is about concealing valuables, secrets in our workplaces. Here, hidden spaces/ messages were created within 8 general objects such as wood boards, lamps and disposable coffee cups.
works like a transparency layer. Programs write on the transparency layer. When you delete the sandbox, it's like removing the transparency layer the system stays as it was.
Because one can locate your InterNet side by the log files, one finds also you. This is for example with the Deeplinking a danger, if the Web master does not permit this to the linked side.
from Sysinternals Freeware, a Registry monitoring utility that will show you which applications are accessing your Registry, which keys they are accessing, and the Registry data that they are reading and writing - all in real-time.
(TrashReg) is an advanced Registry cleaning tool. The main function of RTKF is to allow the removal of unnecessary keys from the Windows Registry. Many programs leave keys in the Registry, even after programs removal...
a fast non-deterministic random bit (number) generator whose randomness relies on intrinsic randomness of the quantum physical process of photonic emission in semiconductors and subsequent detection by photoelectric effect. (funny captcha system)
Filter Unnecessary JPEG Data by removing unnecessary data from images you email or post on the net, without affecting the image quality whatsoever (no decompression/recompression is performed in the filtration), removing such extraneous information
offers the free service to timestamp any publicly available digital document. Timestamping creates evidence, that some digital data already existed at a specific date.
A system for stealthy authentication across closed ports, communication in which information arrives encoded in the form of connection attempts to closed ports.
useful resource for checking whether your popup blocker is working well. Also seems like a good way to make sure you are developing "good" popups for when you need them.
PktFilter is a software that can configure the IP filtering device driver found in Windows 2000/XP/Server 2003, with filtering rules following a syntax similar to IP Filter
A PAL -- a "Permissive Action Link" -- is the box that is supposed to prevent unauthorized use of a nuclear weapon. It's supposed to be impossible to "hot-wire" a nuclear weapon. Is it?
an Open Source (free) tool that allows you to have a different password for all the different programs and websites that you deal with, without actually having to remember all those usernames and passwords. (an alternative to KeepPass if needed)
a tool by the Electronic Frontier Foundation that tests your browser "fingerprint" to see how unique it is based on the information it will share with sites it visits.
a general purpose monitoring platform. provides a framework dealing with (among others) packet demultiplexing, timers, threads and communication. This allows programmers to concentrate on the precise functionnalities they want to implement...
an open source framework for applications that intercept ntercepts ( JDBC )and optionally modify database statements. For JBoss, ATG, Orion, JOnAS, iPlanet, WebLogic, WebSphere, Resin and Tomcat.
a URL based identity system. An OpenID identity is simply a URL, and all the OpenID specification does is provide a way to securely prove that you own that ID on that URL. Unlike most identity systems, OpenID is completely decentralized.
can identify and stop sites trying to phish (steal) your personal information or money. The OpenDNS phishing protection works with all operating systems and browsers, and complements any other security measures already in use, such as a firewall and anti-
a platform for people seriously interested in anti-virus research, network security and computer security to communicate with each other, to develop solutions for various security problems, and to develop new security technologies.