Broaden your selection: Category/Internet-application
- Adblock Plus
- Adblock Plus allows you to regain control of the internet and view the web the way you want to. It is supported by over forty filter subscriptions in dozens of languages which automatically configure it for purposes ranging from removing online advertising to blocking all known malware domains. Adblock Plus also allows you to customize your filters with the assistance of a variety of useful features, including a context option for images, a block tab for Flash and Java objects, and a list of blockable items to remove scripts and stylesheets.
- BAD HARVEST
- BAD HARVEST is a form-mail CGI script designed to be called from links similar to "mailto:...". It helps you to hide email addresses from "harvesters" (automated email-address collectors) while still providing a convenient way for your visitors to contact you.
- DirectNet is a peer-to-peer instant messaging protocol and client software for multiple platforms, including Windows, GNU/Linux and Mac OS X, developed by Gregor Richards.
- GNU Proxyknife
- GNU Proxyknife is a customizable multithread proxy hunter. It can help users behind strict firewall find suitable free proxies. gnu Proxyknife reads proxylist1 from the file, stdin or the web, then validates the free proxies and prints the good ones. Time intervals and the others which are userful to estimate the speed or capability of every proxy are also printed. The whole processing can be customized by the user, which is different from the other hunters. In url mode, Proxyknife can read a large number of proxies on machines with little memory. It works on GNU/Linux, SunOS, OSF1 and more.
- HTTPS Everywhere is a Firefox extension produced as a collaboration between The Tor Project and the Electronic Frontier Foundation. It encrypts your communications with a number of major websites. Many sites on the web offer some limited support for encryption over HTTPS, but make it difficult to use. For instance, they may default to unencrypted HTTP, or fill encrypted pages with links that go back to the unencrypted site. The HTTPS Everywhere extension fixes these problems by rewriting all requests to these sites to HTTPS.
- Karpion Anti-Phishing Toolbar
- This is the first release of Karpion, the Anti-Phishing toolbar for the web browser Konqueror. This tool bar is a part of the Open Phishing Database project.
- Libphish is part of the Open Phishing Database project, an effort to create and maintain and open database of phishing sites in order to protect users, in addition to providing extensions to browsers that utilize the database. Libphish is a library which interacts with the Open Phishing Database, providing a consistent API which browsers and other programs can use to verify the safety and risk level of URLs.
NoScript also provides the most powerful anti-XSS and anti-Clickjacking protection ever available in a browser.
NoScript's unique whitelist based pre-emptive script blocking approach prevents exploitation of security vulnerabilities (known and even not known yet!) with no loss of functionality...
- Privoxy is a Web proxy based on Internet Junkbuster with advanced filtering capabilities for protecting privacy, filtering Web page content, managing cookies, controlling access, and removing ads, banners, pop-ups, and other obnoxious Internet junk. It is useful for both stand-alone systems and multi-user networks.
- Wellenreiter is a GTK/Perl wireless network discovery and auditing tool. Prism2, Lucent, and Cisco based cards are supported. It is the easiest to use Linux scanning tool. No card configuration has to be done anymore. The whole look and feel is pretty self-explaining. It can discover networks (BSS/IBSS), and detects ESSID broadcasting or non-broadcasting networks and their WEP capabilities and the manufacturer automatically. DHCP and ARP traffic are decoded and displayed to give you further information about the networks. An ethereal/tcpdump-compatible dumpfile and an Application savefile will be automaticly created. gpsd can be used to track the location of the discovered networks.
Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the page “GNU Free Documentation License”.
The copyright and license notices on this page only apply to the text on this page. Any software described in this text has its own copyright notice and license, which can usually be found in the distribution itself.