Free Software Foundation!

Join now


From Free Software Directory
Jump to: navigation,

Broaden your selection: Category/Protocol

Category/Protocol Search icon.png

udp (10)

GoVPN is simple free software virtual private network daemon, aimed to be reviewable, secure, DPI/censorship-resistant, written on Go. It uses fast strong passphrase authenticated key agreement protocol with augmented zero-knowledge mutual peers authentication (PAKE DH A-EKE). Encrypted, authenticated data transport that hides message's length and timestamps. Optional encryptionless mode, that still preserves data confidentiality. Perfect forward secrecy property. Resistance to: offline dictionary attacks, replay attacks, client's passphrases compromising and dictionary attacks on the server side. Built-in heartbeating, rehandshaking, real-time statistics. Ability to work through UDP, TCP and HTTP proxies. IPv4/IPv6-compatibility.

NMIS Heckert gnu.small.png
NMIS performs multiple network management functions from the OSI Model and International Organization for Standardization FCAPS model, these being - Fault, Configuration, Accounting and/or Administration, and Performance. These metrics provide valuable capabilities and features for fault and performance management, which in turn are useful for many other aspects of network and business management. NMIS monitors the status and performance of an organization’s IT environment, assists in rectification and identification of faults and provides valuable information for IT departments to plan expenditure and IT changes. The NMIS business rules engine classifies events on their business impact, not just the technical nature. The rules engine is extremely powerful; however it can be configured in minutes for a network with a small number of devices to hours for networks with large numbers of devices.

The paraslash package contains server and client software for network audio streaming and stand-alone utilities for decoding and playing audio files.

Tox is a peer-to-peer, encrypted instant messaging and video calling library that provides APIs for clients, including toxcore, toxav, and toxdns API libraries.

This is the page about the Tox core, not a particular Tox client. Tox itself is not an instant messaging client.

Command line Tox client for secure chat

UDPT is a lightweight UDP based BitTorrent tracker written in C/C++.

UFTP is an encrypted multicast file transfer program, designed to securely, reliably, and efficiently transfer files to multiple receivers simultaneously.

This is useful for distributing large files to a large number of receivers, and is especially useful for data distribution over a satellite link (with two way communication), where the inherent delay makes any TCP based communication highly inefficient.

The multicast encryption scheme is based on TLS with extensions to allow multiple receivers to share a common key. UFTP also has the capability to communicate over disjoint networks separated by one or more firewalls (NAT traversal) and without full end-to-end multicast capability (multicast tunneling) through the use of a UFTP proxy server. These proxies also provide scalability by aggregating responses from a group of receivers.

Visual Space Navigator
VSN or Visual Space Navigator is a project to navigate through the 2 dimensional space represented by either Video or linked images using the accelerometer on your iPhone. In later releases we might support Android and a JavaScript version, but for now we are doing this on iPhone because we like swift coding. Please take a look at the video on YouTube for more details.

xllmnrd is an independent LLMNR responder daemon (a.k.a. llmnrd) for IPv6 networks and currently supports GNU/Linux operating systems with plans to support others. It allows Microsoft Windows clients to get the IPv6 addresses of a server on the same local network without any DNS configuration and can supplement IPv4‐only NetBIOS name resolution provided mainly by Samba.

Zorp is a new generation proxy firewall suite and as such its core architecture is built around today's security demands: it uses application level proxies, it is modular and component based, it uses a script language to describe policy decisions, it makes it possible to monitor encrypted traffic, it let's you override client actions, it let's you protect your servers with its built in IDS capabilities... The list is endless. It gives you all the power you need to implement your local security policy.

Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the page “GNU Free Documentation License”.

The copyright and license notices on this page only apply to the text on this page. Any software or copyright-licenses or other similar notices described in this text has its own copyright notice and license, which can usually be found in the distribution or license text itself.

Personal tools