Free Privacy Software & Access control for Mac
It's a "blind" TCP proxy. It listens on one port, talks to another port. You can configure it to do load balancing (distribute connections among servers) or failover (switch from one server to another when one goes down). You can limit connections by IP...
Ski is an S/Key (one-time pad or password) calculator, with handy features such as storing your passphrases in the system keychain and automatic calculation against challenges on the pasteboard.What is new in this release:This is the first public release...
abmst (A Bit More Secure Terminal) prevents unintended execution of Terminal documents (e.g. viruses, masked as normal documents, which want to execute terminal sessions)Requirements:Mac OS X 10.2 or...
Safe Terminal fixes a security weakness with Mac OS X Terminal utility, when it execute shell scripts without the user confirmation.
If Safari "Open safe files after download" is enabled, its possible to create malicious shell scripts that...
As of the release of this software (April 12, 2004) there haven't been any positive conformations of any harmful media trojans. However, the technicality of such an attack is possible and the Macintosh community is likely to begin to see infected files in...
This utility is a script to help with a security vulnerability recently reported in Mac OS X. It automatically applies several preference settings designed to prevent your system from executing potentially damaging AppleScript commands sent through your...
Scans media files for the resources that Mac OS X uses to locate code within an application. There's some concern that Trojan horse programs can be hidden in certain media files (MP3, AAC, GIF, JPEG). There are plenty of other ways to disguise programs as...
The GPG/PGP web of trust is a very powerful, however complex institution.iTrustGPG tries to change this situation, by making you able to visualize trust relationsips fairly easy.Requires keys to be in internal...
SafeShred is an easy-to-use program designed to shred and completely remove files from your computer by overwriting the files with carefully selected patterns. To shred more sensitive files and information, you can purchase SafeShred Pro. View a feature...
A PHP script and icon package that monitors the Department of Homeland Security's Threat Advisory System and then produces an "alternative" threat icon based on the threat represented by the Bush AdministrationRequirements:A web server running...