lets you instantly set up secure conversations. It's an open source encrypted, private alternative to WEB chat systems. Messages are encrypted inside your own browser using AES-256. Encrypted data is securely wiped after one hour of inactivity. Runs as a Tor hidden service.
a tool by the Electronic Frontier Foundation that tests your browser "fingerprint" to see how unique it is based on the information it will share with sites it visits.
KeePass is a free/open-source password manager or safe which helps you to manage your passwords in a secure way. You can put all your passwords in one database, which is locked with one master key or a key-disk.
social bookmarks manager; allows you to easily add sites you like to your personal collection of links, to categorize those sites with keywords, and to share your collection not only between your own browsers, but also with others.
Filter Unnecessary JPEG Data by removing unnecessary data from images you email or post on the net, without affecting the image quality whatsoever (no decompression/recompression is performed in the filtration), removing such extraneous information
Because one can locate your InterNet side by the log files, one finds also you. This is for example with the Deeplinking a danger, if the Web master does not permit this to the linked side.
a free, open-source, light-weight and easy-to-use password safe for Windows. You can store your passwords in a highly-encrypted database locked with one master key or key-disk.
a software framework that allows for advanced sequence and protocol stream analysis by utilizing bioinformatics algorithms. The sole purpose of this software is to identify protocol fields in unknown or poorly documented network protocol formats.
As CD's are not 100% indestructible many people want to make a backup of their games. Using the backup to play the game thus saving the original. (Fight the DRM)
Linux Video Camera and CCTV (close circuit TV) security and surveillance solution with Motion Detection also support web and semi-automatic control of Pan/Tilt/Zoom cameras using a variety of protocols.
"locks down" an operating system, proactively configuring the system for increased security and decreasing its susceptibility to compromise. Bastille can also assess a system's current state of hardening, granularly reporting on each of the security setti