background preloader

The GNU Privacy Guard - GnuPG.org

The GNU Privacy Guard - GnuPG.org

https://www.gnupg.org/

PGP For Linux It really only makes sense that you would enjoy encryption if you enjoy Linux--you're a geek and you can't help yourself. You love complexity. While the basics of using PGP (Pretty Good Privacy) encryption are not all that difficult, Linux's multi-user environment can sometimes challenge your security habits. GNU Privacy Guard GNU Privacy Guard (GnuPG or GPG) is a GPL Licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with RFC 4880, which is the current IETF standards track specification of OpenPGP. Current versions of PGP (and Veridis' Filecrypt) are interoperable with GnuPG and other OpenPGP-compliant systems. GnuPG is a part of the Free Software Foundation's GNU software project, and has received major funding from the German government.[7] §History[edit] GnuPG is a system compliant to the OpenPGP standard, thus the history of OpenPGP is of importance; it was designed to interoperate with PGP, the email encryption program initially designed and developed by Phil Zimmermann.[10][11]

 TrueCrypt, the final release, archive   Yes . . . TrueCrypt is still safe to use. Google is generating a false-positive alert Recent attempts to download the TrueCrypt files here, using Chrome or Firefox (Mozilla uses Google's technology), have been generating false-positive malware infection warnings. They must be false-positives because no change has been made to the files since this page was put up nearly a year ago (May 29th, 2014) and many people have confirmed that the downloaded binaries have not changed and that their cryptographic hashes still match. Free Portable Encryption Software - Picofactory Description It is a small and extremely fast encryption utility that uses Blowfish encryption algorithm in CBC mode. It is easy to use and support multiple files drag-and-drop. In addition, it is portable, you can put it on your USB memory stick and run it anywhere you go! Very useful for users who want to keep their document secure on their computer or transfer over Internet using unsecure channel.

Arethusa Our VPN service make your internet connection more anonymous and secure. Your real IP address is hidden and your ISP cannot monitor or filter your activity. It works by establishing an encrypted tunnel between your computer and our servers, using a VPN. IBus IBus (Intelligent Input Bus) is an input method framework, a system for entering foreign characters. IBus functions similarly to Fcitx, SCIM and UIM. Installation Install the ibus package from the official repositories. Liferea About Liferea Liferea is a web feed reader/news aggregator that brings together all of the content from your favorite subscriptions into a simple interface that makes it easy to organize and browse feeds. Its GUI is similar to a desktop mail/news client, with an embedded web browser. Distinguishing Features Read articles when offline.

How to Change Your Browser’s User Agent Without Installing Any Extensions All popular browsers offer build-in user agent switchers, so you can change your user agent without installing any extensions. Google Chrome and Internet Explorer both include user agent switchers in their developer tools, while Firefox offers an about:config option. Websites identify browsers by their user agents. Modify a browser’s user agent and it will appear as a different browser – or even a browser running on another device, such as a smartphone or tablet. Google Chrome Chrome 17 added a built-in user agent switcher.

File Encryption Software AxCrypt is the leading open source file encryption software for Windows. It integrates seamlessly with Windows to compress, encrypt, decrypt, store, send and work with individual files. We have received 3,242,753 registrations, so it is tried and proven! AxCrypt is a great complement to services such as Dropbox, Google Drive, Live Mesh, SkyDrive and Box.net . Download n2n a Layer Two Peer-to-Peer VPN n2n is a layer-two peer-to-peer virtual private network (VPN) which allows users to exploit features typical of P2P applications at network instead of application level. This means that users can gain native IP visibility (e.g. two PCs belonging to the same n2n network can ping each other) and be reachable with the same network IP address regardless of the network where they currently belong.

ibus - IBus - Intelligent Input Bus Welcome to IBus project! It is a next generation input framework. Recent news 2012-12-11 ibus 1.5.0 stable release Improve ibus performance by replace some python components with vala implementations. kgpu - Augmenting Linux with The GPU I noticed there are growing interests in KGPU. Thank you guys! But I am currently working on my Snap project and don't have much time to refactoring KGPU. So the biggest limitation may be that it can't work with recent kernels. External contributions are extremely welcome! Ghostery, Inc. Ghosterians! We have a new release ready for the masses. We found a few issues and made some updates. You all have been awesome sending us some quirky behaviour as well. So to you.. we say "Thanks!"

Performance Analysis Tools and Processes Linux treats each task performed on your system as a process, which is assigned a number and a name. You can examine these processes and even stop them. Red Hat provides several tools for examining processes as well as your system performance. Easy monitoring is provided by several GUI tools, like Red Hat's Procman System Monitor. ps Command From the command line, you can use the ps command to list processes.

Related: