Defeating Windows user account control
Shows how easy it would be to gain unauthorized access to a system
Cross-platform multi-protocol VPN software
All-in-one solution for high performance web content delivery
Easy to use cryptographic framework for data protection
Extremely fast non-cryptographic hash algorithm
A dead simple VPN
Example PAM module demonstrating two-factor authentication
Network Load Balancer and Application Security
Browse on Tor/i2p, Anon p2p Chat / FileTx, Conf / Video VoIP
Announcing Robolinux Cinnamon 14.1
IBM's TPM 2.0 TSS
Provide basic firewall program for Kevux using FLL.
Encrypted volumes through command line
Free, easy to use, lightweight soundboard for Windows
IBM's TPM 2.0 Attestation Client Server
57 Hash Functions In One Program, plus each with HMAC or KMAC
Midbar Firebase Edition stores data in the cloud, keeps keys on device
A Bluetooth-based proximity locking tool for Windows
An electronic shelf label is a type of price tag
Fast Wipe
Remote anti spam utility
mkpwd is a password generating program