Cloud affine security distribution
Open source projects to help build and operate more secure systems, along with tools for security monitoring and incident response.
How to for analyzing Truecrypt containers and keys from memory dumps
Spurenarm Surfen mit Mozilla Firefox, E-Mails verschlüsseln mit Thunderbird, Anonymisierungsdienste nutzen und Daten verschlüsseln für WINDOWS + Linux
The fourth Circumvention Tech Summit (CTS) will take place Sept 29 to Oct 1 in Berlin. CTS events are designed to increase dialog and cooperation between privacy tool developers, community activists, journalists and other stakeholders interested in improv
Online security check for outdated browser plug-ins
sleuthkit.org is the official web site for The Sleuth Kit and Autopsy Browser. Both are open source digital investigation tools (a.k.a. digital forensic tools) that run on Windows and Unix systems (such as Linux, OS X, Cygwin, FreeBSD, OpenBSD, and Solaris). They can be used to analyze NTFS, FAT, Ext2, Ext3, UFS1, and UFS2 file systems and several volume system types.
tinc is a Virtual Private Network (VPN) daemon that uses tunnelling and encryption to create a secure private network between hosts on the Internet.