tostado: tools

Sort by: Date / Title / URL

  1. Spurenarm Surfen mit Mozilla Firefox, E-Mails verschlüsseln mit Thunderbird, Anonymisierungsdienste nutzen und Daten verschlüsseln für WINDOWS + Linux
    01-08-2013 to , , and -1 others
  2. The fourth Circumvention Tech Summit (CTS) will take place Sept 29 to Oct 1 in Berlin. CTS events are designed to increase dialog and cooperation between privacy tool developers, community activists, journalists and other stakeholders interested in improv
    14-07-2013 to , , and -1 others
  3. NetHogs is a small 'net top' tool. Instead of breaking the traffic down per protocol or per subnet, like most tools do, it groups bandwidth by process. NetHogs does not rely on a special kernel module to be loaded. If there's suddenly a lot of network traffic, you can fire up NetHogs and immediately see which PID is causing this. This makes it easy to indentify programs that have gone wild and are suddenly taking up your bandwidth.
    02-01-2012 to , and -1 others
  4. Public Etherpad Instance (warning: right now no data can be deleted)
    11-01-2010 to , , and -1 others
  5. EtherPad EtherPad is the only web-based word processor that allows people to work together in really real-time.
    11-01-2010 to , , and -1 others
  6. Das "Transborder Immigrant Tool" soll demnächst illegalen Einwanderern das Passieren der Grenze zwischen den USA und Mexiko erleichtern - und sich auf jedes Billighandy laden lassen.
    02-12-2009 to , , and -1 others
  7. PDF-Shuffler is a small python-gtk application, which helps the user to merge or split pdf documents and rotate, crop and rearrange their pages using an interactive and intuitive graphical interface.
    10-08-2009 to , , and -1 others
  8. Provide a fast way to delete entries from OpenSSH's known_hosts file. This is a simple automation of the things normally done by the user when having an "offending key" in his/her known_hosts file caused by a changing host key of the destination.
    10-08-2009 to , and -1 others
  9. Here is a table with some of the dsyslog features matched up against syslog, rsyslog, metalog, and syslog-ng.
    01-10-2008 to , , and -1 others
  10. tinc is a Virtual Private Network (VPN) daemon that uses tunnelling and encryption to create a secure private network between hosts on the Internet.
    21-09-2008 to , , and -1 others

First / Previous / Next / Last / Page 1 of 2