Difference between revisions of "Gringotts"

From Free Software Directory
Jump to: navigation, search
(Created page with "{{Entry |Name=Gringotts |Short description=Securely saves sensitive data |Full description=Gringotts stores sensitive data (passwords, credit card numbers, PINs, etc.) in an easy...")
 
(Added Ruby link)
 
(4 intermediate revisions by 3 users not shown)
Line 3: Line 3:
 
|Short description=Securely saves sensitive data
 
|Short description=Securely saves sensitive data
 
|Full description=Gringotts stores sensitive data (passwords, credit card numbers, PINs, etc.) in an easy-to-read, easy-to-access, and most of all very secure form. It makes use of the MCrypt and MHash libraries for encryption, and uses GTK+ 2 for the user interface. It lets the user choose from among eight strong encryption algorithms (RIJNDAEL-128, RIJNDAEL-256, SERPENT, TWOFISH, CAST-256, SAFER+, LOKI97, 3DES), two hashing algorithms (SHA1, RIPEMD 160) and two compression techniques (ZLib and BZip2) with four compression ratios. Any file can be used as a password, as an alternative to the usual text string, giving additional choices.
 
|Full description=Gringotts stores sensitive data (passwords, credit card numbers, PINs, etc.) in an easy-to-read, easy-to-access, and most of all very secure form. It makes use of the MCrypt and MHash libraries for encryption, and uses GTK+ 2 for the user interface. It lets the user choose from among eight strong encryption algorithms (RIJNDAEL-128, RIJNDAEL-256, SERPENT, TWOFISH, CAST-256, SAFER+, LOKI97, 3DES), two hashing algorithms (SHA1, RIPEMD 160) and two compression techniques (ZLib and BZip2) with four compression ratios. Any file can be used as a password, as an alternative to the usual text string, giving additional choices.
 +
|Homepage URL=http://gringotts.shlomifish.org/
 
|User level=none
 
|User level=none
|Submitted by=Database conversion
+
|Is High Priority Project=No
 +
|VCS checkout command=password: anonymous
 +
|Computer languages=C,XML
 +
|Decommissioned/Obsolete=No
 +
|Accepts cryptocurrency donations=No
 +
|Related projects=Aesutil
 +
|Keywords=security,3DES,password,PIN,Twofish,credit card,mcrypt,SERPENT,SAFER+,LOKI97,SHA1,RIPEMD-160,gringotts,encryption,MHash,RIJNDAEL-128,RIJNDAEL-256,CAST-256
 +
|Version identifier=1.2.10
 +
|Version date=2009/06/13
 +
|Version status=stable
 +
|Version download=https://sourceforge.net/projects/gringotts.berlios/files/gringotts-1.2.10.tar.gz/download
 +
|Test entry=No
 +
|Last review by=Bendikker
 +
|Last review date=2018/04/17
 
|Submitted date=2011-04-01
 
|Submitted date=2011-04-01
|Version identifier=1.3.0pre5
+
|Is GNU=No
|Version date=2003-01-15
 
|Version status=developmental
 
|Version download=
 
 
|License verified date=2002-06-11
 
|License verified date=2002-06-11
|Version comment=1.3.0pre5 devel released 2003-01-15
+
}}
 +
{{Project license
 +
|License=GPLv2
 +
|License verified by=Dan Munro
 +
|License verified date=2017/12/01
 +
}}
 +
{{Person
 +
|Real name=Germano Rizzo
 +
|Role=Maintainer
 +
|Email=mano@pluto.linux.it
 +
}}
 +
{{Person
 +
|Real name=Hermann J. Beckers
 +
|Role=Contributor
 +
|Email=hjb-rheine@t-online.de
 +
}}
 +
{{Person
 +
|Real name=Nicolas Pouillon
 +
|Role=Contributor
 +
|Email=nipo@ssji.net
 +
}}
 +
{{Resource
 +
|Resource audience=Ruby (Ref)
 +
|Resource URL=https://rubygems.org/gems/gringotts
 +
}}
 +
{{Resource
 +
|Resource audience=Debian (Ref)
 +
|Resource URL=https://tracker.debian.org/pkg/gringotts
 +
}}
 +
{{Resource
 +
|Resource audience=Bug Tracking,Developer,Support
 +
|Resource kind=E-mail
 +
|Resource URL=mailto:mano@pluto.linux.it
 +
}}
 +
{{Software category
 +
|Interface=command-line
 +
|Security=encryption
 +
|Use=security
 
}}
 
}}
 
{{Software prerequisite
 
{{Software prerequisite
Line 45: Line 93:
 
|Prerequisite description=autoconf 2.52 or later
 
|Prerequisite description=autoconf 2.52 or later
 
}}
 
}}
 +
{{Featured}}

Latest revision as of 08:09, 17 April 2018


[edit]

Gringotts

http://gringotts.shlomifish.org/
Securely saves sensitive data

Gringotts stores sensitive data (passwords, credit card numbers, PINs, etc.) in an easy-to-read, easy-to-access, and most of all very secure form. It makes use of the MCrypt and MHash libraries for encryption, and uses GTK+ 2 for the user interface. It lets the user choose from among eight strong encryption algorithms (RIJNDAEL-128, RIJNDAEL-256, SERPENT, TWOFISH, CAST-256, SAFER+, LOKI97, 3DES), two hashing algorithms (SHA1, RIPEMD 160) and two compression techniques (ZLib and BZip2) with four compression ratios. Any file can be used as a password, as an alternative to the usual text string, giving additional choices.





Licensing

License

Verified by

Verified on

Notes

License

GPLv2

Verified by

Dan Munro

Verified on

1 December 2017




Leaders and contributors

Contact(s)Role
Nicolas Pouillon Contributor
Germano Rizzo Maintainer
Hermann J. Beckers Contributor


Resources and communication

AudienceResource typeURI
Bug Tracking,Developer,SupportE-mailmailto:mano@pluto.linux.it
Ruby (Ref)https://rubygems.org/gems/gringotts
Debian (Ref)https://tracker.debian.org/pkg/gringotts


Software prerequisites

KindDescription
Required to useGTK+
Weak prerequisiteautomake 1.5 or later (both for builing from CVS)
Required to uselibbz2
Required to buildpkg-config
Required to uselibmcrypt
Weak prerequisiteautoconf 2.52 or later
Required to uselibmhash
Required to usezlib




Entry
















"Ruby (Ref)" is not in the list (General, Help, Bug Tracking, Support, Developer) of allowed values for the "Resource audience" property.


"Debian (Ref)" is not in the list (General, Help, Bug Tracking, Support, Developer) of allowed values for the "Resource audience" property.


























Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the page “GNU Free Documentation License”.

The copyright and license notices on this page only apply to the text on this page. Any software or copyright-licenses or other similar notices described in this text has its own copyright notice and license, which can usually be found in the distribution or license text itself.