Main > Java >

Security Software Free Download



 
Premium Featured Software
TotalMedia Theatre 5 is a media player that is designed for playing Blu-ray and DVD discs, AVCHD, or high-definition files on local machines or videos on a UPnP server and online
Email Password Recovery Master lets users recover email account passwords that have been cached by popular email clients

Security Software List by Date

Sorted By Date | Ranking | Popularity
This is a simple example of how to use java to encrypt strings. Best used for learning purposes, source code and class files available for download.
Price: $0.00
Filesize:

Keep all your account information with user id,password,url and notes information in one place. With PasswordManager, you can organize passwords in multiple files. Data files will be encrypted. Each and every file has to be assigned with a password which
Price: $0.00
Filesize:

A similar to Tripwire, file system integrity checking tool but develop in java and cross platform. This tools checking and source control using check sum algorithm like MD5, SHA and CRC. It provide generate current file integiry checksum record to
Price: $0.00
Filesize:

SMSAuthenticator is an authentication module for situations where "username and password"-login provide insufficient security. Additional security is achieved by sending keys by SMS to the users mobile phone. The user must return a correct single-use
Price: $0.00
Filesize:

This can come in very handy, if you need to compare 2 different projects or envs. For example Development server against prod, to ensure they both have same certs stored in cacerts (sampled by java among others). Code to generate list of certs,
Price: $0.00 USD
Filesize:

Implementing a customized security library is expensive and unsuitable for medium and small applications. The Java Cryptography Extension, while the accepted standard for these apps, brings up a host of other problems. This article analyzes those
Price: $0.00
Filesize:

Follow along as Java architect Abhijit Belapurkar leads this detailed, behind-the-scenes introduction to two distinctly different (yet related) models of authorization: the code-centric model of the Java 2 platform security architecture and the
Price: $0.00
Filesize:

A core requirement of any non-trivial P2P application is secure communication between peers. While the details of the security depend on how the application will be used and on what it will protect, its often possible to implement strong,
Price: $0.00
Filesize:

Weblets are Java programs that run in a browser, using DirectDOM to directly manipulate displayed documents. Like most Web-based programs, weblets pose a threat to system security if theyre mishandled. Fortunately, weblets come with built-in security in
Price: $0.00
Filesize:

The problem of system security starts with discovering the identity of the user on the other end of the communications link. This article discusses three familiar approaches for identifying users, highlights their strengths and weaknesses (alone and in
Price: $0.00
Filesize:

  • Page: 1 of 1
  • 1