Tag Archive: Mac

EncFS MP

Mounts EncFS folders on Windows and OS X Can create, edit, export and change the password of EncFS folders Is 100% compatible with EncFS 1.7.4 on Linux Completely free, no nags, no additional downloads like toolbars etc. With EncFS MP, you can store your data in an encrypted folder. This is especially important if you …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2016/10/27/encfs-mp/

Viivo | Cloud Storage Encryption Software/ Free For Personal use

Encrypt your files before they sync to Dropbox®, Box®, Google Drive™, OneDrive® or any other folder on your devices. Viivo uses public key cryptography to secure your files before they synchronize to your cloud storage provider. Unlike other approaches to encryption, we accomplish this without breaking cloud provider workflows. Viivo encryption and decryption is automatic. …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2016/10/26/viivo-cloud-storage-encryption-software-free-for-personal-use/

ENCRYPTO

Send encrypted files via email, Dropbox, file sharing service, carrier pigeon with USB stick — however you send them, your files are protected. It’s free for both Windows and Mac. Encrypto takes any file or folder and adds AES-256 encryption to it. With encryption, you know your file is incredibly secure and that only the right …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2016/10/23/encrypto/

OPEN SECURITY TRAINING .INFO

In the spirit of OpenCourseWare and the Khan Academy, OpenSecurityTraining.info is dedicated to sharing training material for computer security classes, on any topic, that are at least one day long. All material is licensed with an open license like CreativeCommons, allowing anyone to use the material however they see fit, so long as they share …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2016/10/19/open-security-training-info/

Snort 2.9.7.0

Open-Source IDS/IPS Download Snort

Permanent link to this article: http://www.darknessgate.com/2015/03/04/snort-2-9-7-0/

Medusa Parallel Network Login Auditor

Medusa is intended to be a speedy, massively parallel, modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. The author considers following items as some of the key features of this application: Thread-based parallel testing. Brute-force testing can be performed against multiple hosts, users or passwords concurrently. …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2015/02/24/medusa-parallel-network-login-auditor/

Crowbar

Crowbar (crowbar) is brute forcing tool that can be used during penetration tests. It is developed to brute force some protocols in a different manner according to other popular brute forcing tools. As an example, while most brute forcing tools use username and password for SSH brute force, Crowbar uses SSH key. So SSH keys, …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2015/02/23/crowbar/

SilentEye

SilentEye is a cross-platform application design for an easy use of steganography, in this case hiding messages into pictures or sounds. It provides a pretty nice interface and an easy integration of new steganography algorithm and cryptography process by using a plug-ins system. SilentEye is free to use (under GNU GPL v3). Main Features Hide …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/12/25/silenteye/

Permanent link to this article: http://www.darknessgate.com/2014/11/06/exiv2/

Theory and Practice of Cryptography Mini-Course

This mini-course was taught in 2007 at Google. It is intended to be a brief survey for a general technical audience. Video Lectures Classical to Modern Cryptography Using Cryptography in Practice Security Definitions and Proofs of Security Verifying Elections with Cryptography. Guest Lecturer: Ben Adida. Crypto Strikes Back! by Nate Lawson, with blog post and …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/02/theory-practice-cryptography-mini-course/

Language-Based Security VT14

After the course, you should be able to apply practical knowledge of security for modern programming languages. This includes the ability to identify application- and language-level security threats, design and argue for application- and language-level security policies, and design and argue for the security, clarity, usability, and efficiency of solutions, as well as implement such …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/08/22/language-based-security-vt14/

Page 1 of 612345...Last »