Scripts are listed afer popularity. To display the scripts in alphabetical order please click here
This application can securely manage your user id, password, URL in data files in tabular form with password protection. The Data files can also be encrypted and supports unlimited data files and records.
Java Proxy is an advanced traffic redirection tool that can provide access to computers behind firewalls or NAT. The features can be accomplished without modifying the configuration. Services like WWW, FTP, E-mail, Instant Messaging tools etc can be accessed.
Your guide to weblet security
This article discusses implementing security to weblets that have the same exposures as applets do. It also describes what the weblet are, what they can/cannot do by default?. It also teaches how to overcome the problems related with sandbox.
RSA Implementation for Java
RSA Implementation for Java is an online application with which you would be able to implement RSA encryption standard on all your java based software projects.
This disables the right click functions like print screens and control-c copy functions and prevents copying of your online images like bmp, jpg or gif. When a visitor tries to copy the image, it immediately returns to thumbnail view.
Secure communication between peers: SSL through JSSE
This tutorial discusses implementing secure communication between peers. An important requirement of any non-trivial P2P application is secure communication between peers. This tutorial explains how to use SSL through JSSE in P2P security.
A three-pronged solution for identifying users
This article discusses a three-layered method to establish the identity of the user on the other end of the communication link. This article discusses with examples the three familiar approaches for establishing the identity of the users, highlight their strength and weaknesses.
What is IBM Tivoli Access Manager for Microsoft .NET?
This tutorial is an useful guide to all those programmers who wish to integrate tivoli's enterprise security solutions on their websites so as to improve their security measures.
Application Privacy Monitoring for JDBC
SMSAuthenticator obviates the problem of password guessing and password sniffing. It takes over where the usual username and password login fail. It can generate passwords conforming to the FIPS 181 standards.
Java File Integrity Checking - ChkSum
Java File Integrity Checking - ChkSum uses check cum algorithm like MD5, SHA and CRC as a tool to implement checking and source control.
Java authorization internals
Java authorization internals is a tutorial that tells the readers about the Java authorization architectures. This tutorial can be used by the users who have an intermediate level of Java knowledge.
SSC - Somewhat Secure Communications
SSC2 is an online security program written in java assisting software developers and programmers to enhance and squeez the security measures of their online projects.