Difference between revisions of "Gringotts"
m (fixed typo in Keywords that prevented parsing for editing with form.) |
(updated homepage and version) |
||
Line 3: | Line 3: | ||
|Short description=Securely saves sensitive data | |Short description=Securely saves sensitive data | ||
|Full description=Gringotts stores sensitive data (passwords, credit card numbers, PINs, etc.) in an easy-to-read, easy-to-access, and most of all very secure form. It makes use of the MCrypt and MHash libraries for encryption, and uses GTK+ 2 for the user interface. It lets the user choose from among eight strong encryption algorithms (RIJNDAEL-128, RIJNDAEL-256, SERPENT, TWOFISH, CAST-256, SAFER+, LOKI97, 3DES), two hashing algorithms (SHA1, RIPEMD 160) and two compression techniques (ZLib and BZip2) with four compression ratios. Any file can be used as a password, as an alternative to the usual text string, giving additional choices. | |Full description=Gringotts stores sensitive data (passwords, credit card numbers, PINs, etc.) in an easy-to-read, easy-to-access, and most of all very secure form. It makes use of the MCrypt and MHash libraries for encryption, and uses GTK+ 2 for the user interface. It lets the user choose from among eight strong encryption algorithms (RIJNDAEL-128, RIJNDAEL-256, SERPENT, TWOFISH, CAST-256, SAFER+, LOKI97, 3DES), two hashing algorithms (SHA1, RIPEMD 160) and two compression techniques (ZLib and BZip2) with four compression ratios. Any file can be used as a password, as an alternative to the usual text string, giving additional choices. | ||
+ | |Homepage URL=http://gringotts.shlomifish.org/ | ||
|User level=none | |User level=none | ||
− | |||
− | |||
− | |||
|VCS checkout command=password: anonymous | |VCS checkout command=password: anonymous | ||
|Computer languages=C,XML | |Computer languages=C,XML | ||
− | |||
− | |||
− | |||
− | |||
− | |||
|Related projects=Aesutil | |Related projects=Aesutil | ||
|Keywords=security,3DES,password,PIN,Twofish,credit card,mcrypt,SERPENT,SAFER+,LOKI97,SHA1,RIPEMD-160,gringotts,encryption,MHash,RIJNDAEL-128,RIJNDAEL-256,CAST-256 | |Keywords=security,3DES,password,PIN,Twofish,credit card,mcrypt,SERPENT,SAFER+,LOKI97,SHA1,RIPEMD-160,gringotts,encryption,MHash,RIJNDAEL-128,RIJNDAEL-256,CAST-256 | ||
− | | | + | |Version identifier=1.2.10 |
− | |Last review by= | + | |Version date=2009/06/13 |
− | |Last review date= | + | |Version status=stable |
− | + | |Version download=https://sourceforge.net/projects/gringotts.berlios/files/gringotts-1.2.10.tar.gz/download | |
+ | |Last review by=Dan Munro | ||
+ | |Last review date=2017/12/01 | ||
|Submitted date=2011-04-01 | |Submitted date=2011-04-01 | ||
− | | | + | |Is GNU=No |
− | |||
− | |||
− | |||
|License verified date=2002-06-11 | |License verified date=2002-06-11 | ||
− | | | + | }} |
+ | {{Project license | ||
+ | |License=GPLv2 | ||
+ | |License verified by=Dan Munro | ||
+ | |License verified date=2017/12/01 | ||
}} | }} | ||
{{Person | {{Person | ||
+ | |Real name=Germano Rizzo | ||
|Role=Maintainer | |Role=Maintainer | ||
− | |||
|Email=mano@pluto.linux.it | |Email=mano@pluto.linux.it | ||
− | |||
}} | }} | ||
{{Person | {{Person | ||
+ | |Real name=Hermann J. Beckers | ||
|Role=Contributor | |Role=Contributor | ||
− | |||
|Email=hjb-rheine@t-online.de | |Email=hjb-rheine@t-online.de | ||
− | |||
}} | }} | ||
{{Person | {{Person | ||
+ | |Real name=Nicolas Pouillon | ||
|Role=Contributor | |Role=Contributor | ||
− | |||
|Email=nipo@ssji.net | |Email=nipo@ssji.net | ||
− | |||
}} | }} | ||
{{Resource | {{Resource | ||
Line 55: | Line 48: | ||
|Security=encryption | |Security=encryption | ||
|Use=security | |Use=security | ||
− | |||
− | |||
− | |||
− | |||
− | |||
}} | }} | ||
{{Software prerequisite | {{Software prerequisite |
Revision as of 13:56, 1 December 2017
Gringotts
http://gringotts.shlomifish.org/
Securely saves sensitive data
Gringotts stores sensitive data (passwords, credit card numbers, PINs, etc.) in an easy-to-read, easy-to-access, and most of all very secure form. It makes use of the MCrypt and MHash libraries for encryption, and uses GTK+ 2 for the user interface. It lets the user choose from among eight strong encryption algorithms (RIJNDAEL-128, RIJNDAEL-256, SERPENT, TWOFISH, CAST-256, SAFER+, LOKI97, 3DES), two hashing algorithms (SHA1, RIPEMD 160) and two compression techniques (ZLib and BZip2) with four compression ratios. Any file can be used as a password, as an alternative to the usual text string, giving additional choices.
Download
https://sourceforge.net/projects/gringotts.berlios/files/gringotts-1.2.10.tar.gz/download
Categories
Licensing
License
Verified by
Verified on
Notes
Leaders and contributors
Contact(s) | Role |
---|---|
Nicolas Pouillon | Contributor |
Germano Rizzo | Maintainer |
Hermann J. Beckers | Contributor |
Resources and communication
Audience | Resource type | URI |
---|---|---|
Bug Tracking,Developer,Support | mailto:mano@pluto.linux.it | |
Ruby (Ref) | https://rubygems.org/gems/gringotts | |
Debian (Ref) | https://tracker.debian.org/pkg/gringotts |
Software prerequisites
Kind | Description |
---|---|
Required to use | GTK+ |
Weak prerequisite | automake 1.5 or later (both for builing from CVS) |
Required to use | libbz2 |
Required to build | pkg-config |
Required to use | libmcrypt |
Weak prerequisite | autoconf 2.52 or later |
Required to use | libmhash |
Required to use | zlib |
Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the page “GNU Free Documentation License”.
The copyright and license notices on this page only apply to the text on this page. Any software or copyright-licenses or other similar notices described in this text has its own copyright notice and license, which can usually be found in the distribution or license text itself.