Simple tool for irretrievably deleting entire hard disks and data. According to the developer it works independent of the partition layout, file and operating system and deals with otherwise inaccessible proprietary formats. Also available as advanced versions (basic, standard and professional).
Tool based on rainbow tables for the recovery of Windows passwords. Also uses a time-memory trade-off and comes with a graphical user interface to ensure the tool is easy to use. Contains a brute force module for the detection of more simple passwords.
Anti-virus protection designed especially for emails on Unix-based mail gateways. Offers a flexible and scalable multi-threaded daemon, command-line scanner and automatic updater. Also available as a version for Windows.
Cross-platform password manager. Provides sorting user names and passwords into groups, saving them with URLs and notes and copies them into the browser or other applications via clipboard. Fast and secure download from The H
Generates TrueCrypt-compatible container files (UDF 1.02) from any selection of files. These are exactly sized to suit the amount of data content and can be opened in TrueCrypt. They can also be directly extracted or invalidated again with TruPax. Neither administrator rights nor TrueCrypt are necessary to do so. Fast and secure download from The H
Beta security platform for mobile devices. Provides encryption of the entire system, including a firewall blocking outgoing connections from Android apps and selective permission for apps to communicate with specific servers.
Simplifies the configuration of firewall scripts for iptables and ipchains. The graphical interface is based on modern firewall GUIs and allows easily creating firewall rules to be implemented in a script. Download of the versions for Windows and Mac OS X requires a valid email address. Fast and secure download from The H
Tests web applications for security breaches. Uses heuristic methods for automatically detecting vulnerabilities to attacks by cross-site scripting or SQL and XML injection. Creates a report on necessary improvements. Requires Cygwin on Windows.
Modified Live-CD based on Ubuntu for the short-term provision of an isolated working environment where sensitive data can be dealt with securely while the operating system installed on the computer remains untouched. Not intended for permanent installation on the hard disk. Fast and secure download from The H
Open-source router with web, virus and spam filters. Includes integrated VPN access and a tool for analysing data traffic on the router. This router has its own operating system and deletes existing files when it’s installed.
Linux-based Enterprise-Firewall/Unified Threat Management solution for protecting your network against harmful attacks from the internet; it uses Stateful Inspection, URL and email filtering to provide protection from attacks, such as hacks, trojans and email and web-viruses. It manages various VPN and SSL connections and enable policy routing. Download requires registration.