Do Israel's New Fighter Jets Mean Stealth Is Going Out Of Style?
For decades, military planners have touted the age of the stealth airplane. But an order for new jets from the Israeli Air Force tells us it may all be coming to an end. Israel just did something a we...
New U.S. stealth bomber shrouded in mystery
Nearly 30 years after the first U.S. stealth bomber took flight, the Air Force's aging fleet is primed for a makeover; albeit an expensive one. The Pentagon is looking to upgrade its stealth aircraft ...
Cryptocat
Cryptocat is an open source web and mobile application intended to allow secure, encrypted online chatting. Cryptocat uses end-to-end encryption and encrypts chats on the client side, only trusting th...
Cryptocat - Wikipedia
Do Israel's New Fighter Jets Mean Stealth Is Going Out Of Style?
For decades, military planners have touted the age of the stealth airplane. But an order for new jets from the Israeli Air Force tells us it may all be coming to an end. Israel just did something a we...
Cloaking device
A cloaking device is a theoretical or fictional stealth technology that can cause objects, such as spaceships or individuals, to be partially or wholly invisible to parts of the electromagnetic (EM) s...
Cloaking device - Wikipedia
Libgcrypt
Libgcrypt is a cryptographic library developed as a separated module of GnuPG. It can also be used independently of GnuPG, although it requires its error-reporting library.It provides functions for a...
Uncomplicated Firewall
Uncomplicated Firewall (ufw) is a firewall that is designed to be easy to use. It uses a command line interface consisting of a small number of simple commands, and uses iptables for configuration.
Uncomplicated Firewall - Wikipedia
Immunix
Immunix was a commercial operating system that provided host-based application security solutions. The last release of Immunix's GNU/Linux distribution was version 7.3 on November 27, 2003. Immunix, I...
OpenSSL
In computer networking, OpenSSL is an open-source implementation of the SSL and TLS protocols. The core library, written in the C programming language, implements basic cryptographic functions and p...
Stealth ground vehicle
Ground vehicles using stealth technology have come to fruition at various times in history.The Challenger 2 features a redesigned hull and turret offering lower radar observability over its predecesso...
Stealth ground vehicle - Wikipedia
Stealth aircraft
Stealth aircraft are designed to avoid detection using a variety of advanced technologies that reduce reflection/emission of radar, infrared, visible light, radio-frequency (RF) spectrum, and audio, c...
Stealth aircraft - Wikipedia
Keychain (Apple)
Keychain is password management system in OS X developed by Apple. It was introduced with Mac OS 8.6, and has been included in all subsequent versions of Mac OS, including OS X. A Keychain can contain...
Keychain (Apple) - Wikipedia
Distributed Access Control System
The Distributed Access Control System (DACS) is a light-weight single sign-on androle-based access control system forweb serversandserver-based software.DACS is primarily used withApache web serversto...
Clam AntiVirus
Clam AntiVirus (ClamAV) is a free and open-source, cross-platform antivirus software tool-kit able to detect many types of malicious software, including viruses. One of its main uses is on mail server...
Clam AntiVirus - Wikipedia
Digital Forensics Framework
Digital Forensics Framework (DFF) is an open source computer forensics software. It advertises the ability to be used by both professionals and non-experts to collect, preserve, and reveal digital evi...
OpenSSH
OpenSSH, also known as OpenBSD Secure Shell, is a suite of network-level security tools based on the SSH protocol which help to secure network communications via the encryption of network traffic over...
OpenSSH - Wikipedia
MatrixSSL
MatrixSSL is an TLS/SSL implementation designed for custom applications in embedded hardware environments. The MatrixSSL library contains a full cryptographic software module that includes industry-st...
OSSEC
OSSEC is a free, open-source host-based intrusion detection system (HIDS). It performs log analysis, integrity checking, Windows registry monitoring, rootkit detection, time-based alerting, and active...
Nessus (software)
Nessus is a proprietary comprehensive vulnerability scanner which is developed by Tenable Network Security. It is free of charge for personal use in a non-enterprise environment.According to surveys d...
Nessus (software) - Wikipedia
Seahorse (software)
Seahorse is a GNOME front-end application for managing PGP and SSH keys. Seahorse integrates with Nautilus, gedit and Evolution for encryption, decryption and other operations. It has HKP and LDAP ke...
Seahorse (software) - Wikipedia
Java Anon Proxy
Java Anon Proxy, also known as JAP or JonDonym, is a proxy system designed to allow browsing the Web with revocable pseudonymity. It was originally developed as part of a project of the Technische Un...
Java Anon Proxy - Wikipedia
The Amnesic Incognito Live System
Tails or The Amnesic Incognito Live System is a security-focused Debian-based Linux distribution aimed at preserving privacy and anonymity. All its outgoing connections are forced to go through Tor, a...
The Amnesic Incognito Live System - Wikipedia
FLAIM
FLAIM (Framework for Log Anonymization and Information Management) is a modular tool designed to allow computer and network log sharing through application of complex data sanitization policies.FLAIM ...
FLAIM - Wikipedia
Radar-absorbent material
Radar-absorbent material, or RAM, is a class of materials used in stealth technology to disguise a vehicle or structure from radar detection. A material's absorbency at a given frequency of radar wave...
GNOME Keyring
GNOME Keyring is a daemon application designed to take care of the user's security credentials, such as user names and passwords. The sensitive data is encrypted and stored in a keyring file in the us...
GNOME Keyring - Wikipedia
John the Ripper
John the Ripper is a free password cracking software tool. Initially developed for the Unix operating system, it now runs on fifteen different platforms (eleven of which are architecture-specific vers...
PolarSSL
mbed TLS (previously PolarSSL) is a dual licensed (GPLv2 or proprietary) implementation of the SSL and TLS protocols and the respective cryptographic algorithms and support code required. Stated on th...
Nettle (cryptographic library)
Nettle is a cryptographic library designed to fit easily in a wide range of toolkits and applications. It began as a collection of low-level cryptography functions from lsh in 2001. Since June 2009 ...