YFKlog

YFKlog 0.3.5

YFKlog is a general purpose ham radio logbook for *nix operating systems. YFKlog runs in text mode, which means it can easily be used on a remote server, even from Windows-Computers with PuTTY.It was primarily designed with normal HF/VHF-operation in...

YMShell

YMShell 1.0

YMShell is a console based yahoo messenger client. The interface is similar to an UNIX shell and most of the commands are like UNIX commands. e.g. 'talk starts a conversation with that id. (Read README for all command help). The program needs libyahoo2...

ytalk

ytalk 3.1.1

YTalk is a compatible replacement for the Unix talk(1) program, which adds a number of features. Mainly, it can talk to more than one person at a time, and it can the two different types of talk daemons out there.To install this commands are...

Z-push

Z-push 1.2

Z-push project is an implementation of the ActiveSync protocol, which is used 'over-the-air' for multi platform ActiveSync devices, including Windows Mobile, Ericsson and Nokia phones. With Z-push any groupware can be connected and synced with tMobile...

Z1 SecureMail Gateway is a central, server-based software solution which provides encryption and digital signatures (PGP and S/MIME) for the entire email traffic of an organization. It works with organizational certificates and certificates for individual...

Z1 SecureMail Messenger is an optional extension for Z1 SecureMail Gateway. The project requires no PKI technology or certificates in order to enable confidential messages to be sent encrypted over the Internet to external partners.Instead of using e-mail...

zeMail

zeMail 1.0

zeMail is a minimalist webmail package written in Mason. It implements the basic features one would expect from an IMAP mail client, displaying folder and message contents, handling attachments and allowing you to move, mark and purge your messages.zeMail...

Zfone

Zfone Beta2

Zfone uses a new protocol called ZRTP, which is better than the other approaches to secure VoIP, because it achieves security without reliance on a PKI, key certification, trust models, certificate authorities, or key management complexity that bedevils...