Difference between revisions of "Gringotts"

From Free Software Directory
Jump to: navigation, search
m (fixed typo in Keywords that prevented parsing for editing with form.)
(updated homepage and version)
Line 3: Line 3:
 
|Short description=Securely saves sensitive data
 
|Short description=Securely saves sensitive data
 
|Full description=Gringotts stores sensitive data (passwords, credit card numbers, PINs, etc.) in an easy-to-read, easy-to-access, and most of all very secure form. It makes use of the MCrypt and MHash libraries for encryption, and uses GTK+ 2 for the user interface. It lets the user choose from among eight strong encryption algorithms (RIJNDAEL-128, RIJNDAEL-256, SERPENT, TWOFISH, CAST-256, SAFER+, LOKI97, 3DES), two hashing algorithms (SHA1, RIPEMD 160) and two compression techniques (ZLib and BZip2) with four compression ratios. Any file can be used as a password, as an alternative to the usual text string, giving additional choices.
 
|Full description=Gringotts stores sensitive data (passwords, credit card numbers, PINs, etc.) in an easy-to-read, easy-to-access, and most of all very secure form. It makes use of the MCrypt and MHash libraries for encryption, and uses GTK+ 2 for the user interface. It lets the user choose from among eight strong encryption algorithms (RIJNDAEL-128, RIJNDAEL-256, SERPENT, TWOFISH, CAST-256, SAFER+, LOKI97, 3DES), two hashing algorithms (SHA1, RIPEMD 160) and two compression techniques (ZLib and BZip2) with four compression ratios. Any file can be used as a password, as an alternative to the usual text string, giving additional choices.
 +
|Homepage URL=http://gringotts.shlomifish.org/
 
|User level=none
 
|User level=none
|Status=Live
 
|Component programs=
 
|Homepage URL=http://devel.pluto.linux.it/projects/Gringotts/
 
 
|VCS checkout command=password: anonymous
 
|VCS checkout command=password: anonymous
 
|Computer languages=C,XML
 
|Computer languages=C,XML
|Documentation note=
 
|Paid support=
 
|IRC help=
 
|IRC general=
 
|IRC development=
 
 
|Related projects=Aesutil
 
|Related projects=Aesutil
 
|Keywords=security,3DES,password,PIN,Twofish,credit card,mcrypt,SERPENT,SAFER+,LOKI97,SHA1,RIPEMD-160,gringotts,encryption,MHash,RIJNDAEL-128,RIJNDAEL-256,CAST-256
 
|Keywords=security,3DES,password,PIN,Twofish,credit card,mcrypt,SERPENT,SAFER+,LOKI97,SHA1,RIPEMD-160,gringotts,encryption,MHash,RIJNDAEL-128,RIJNDAEL-256,CAST-256
|Is GNU=n
+
|Version identifier=1.2.10
|Last review by=Janet Casey
+
|Version date=2009/06/13
|Last review date=2003-04-28
+
|Version status=stable
|Submitted by=Database conversion
+
|Version download=https://sourceforge.net/projects/gringotts.berlios/files/gringotts-1.2.10.tar.gz/download
 +
|Last review by=Dan Munro
 +
|Last review date=2017/12/01
 
|Submitted date=2011-04-01
 
|Submitted date=2011-04-01
|Version identifier=1.2.7
+
|Is GNU=No
|Version date=2003-04-28
 
|Version status=stable
 
|Version download=http://devel.pluto.linux.it/projects/Gringotts/current/gringotts-1.2.7.tar.gz
 
 
|License verified date=2002-06-11
 
|License verified date=2002-06-11
|Version comment=1.2.7 stable released 2003-04-28
+
}}
 +
{{Project license
 +
|License=GPLv2
 +
|License verified by=Dan Munro
 +
|License verified date=2017/12/01
 
}}
 
}}
 
{{Person
 
{{Person
 +
|Real name=Germano Rizzo
 
|Role=Maintainer
 
|Role=Maintainer
|Real name=Germano Rizzo
 
 
|Email=mano@pluto.linux.it
 
|Email=mano@pluto.linux.it
|Resource URL=
 
 
}}
 
}}
 
{{Person
 
{{Person
 +
|Real name=Hermann J. Beckers
 
|Role=Contributor
 
|Role=Contributor
|Real name=Hermann J. Beckers
 
 
|Email=hjb-rheine@t-online.de
 
|Email=hjb-rheine@t-online.de
|Resource URL=
 
 
}}
 
}}
 
{{Person
 
{{Person
 +
|Real name=Nicolas Pouillon
 
|Role=Contributor
 
|Role=Contributor
|Real name=Nicolas Pouillon
 
 
|Email=nipo@ssji.net
 
|Email=nipo@ssji.net
|Resource URL=
 
 
}}
 
}}
 
{{Resource
 
{{Resource
Line 55: Line 48:
 
|Security=encryption
 
|Security=encryption
 
|Use=security
 
|Use=security
}}
 
{{Project license
 
|License=GPLv2
 
|License verified by=Janet Casey
 
|License verified date=2002-06-11
 
 
}}
 
}}
 
{{Software prerequisite
 
{{Software prerequisite

Revision as of 12:56, 1 December 2017

[edit]

Gringotts

http://gringotts.shlomifish.org/
Securely saves sensitive data

Gringotts stores sensitive data (passwords, credit card numbers, PINs, etc.) in an easy-to-read, easy-to-access, and most of all very secure form. It makes use of the MCrypt and MHash libraries for encryption, and uses GTK+ 2 for the user interface. It lets the user choose from among eight strong encryption algorithms (RIJNDAEL-128, RIJNDAEL-256, SERPENT, TWOFISH, CAST-256, SAFER+, LOKI97, 3DES), two hashing algorithms (SHA1, RIPEMD 160) and two compression techniques (ZLib and BZip2) with four compression ratios. Any file can be used as a password, as an alternative to the usual text string, giving additional choices.



Download

https://sourceforge.net/projects/gringotts.berlios/files/gringotts-1.2.10.tar.gz/download

version 1.2.10 (stable)
released on 13 June 2009




VCS Checkout

password: anonymous

Categories

Related Projects





Licensing

License

Verified by

Verified on

Notes

License

GPLv2

Verified by

Dan Munro

Verified on

1 December 2017




Leaders and contributors

Contact(s)Role
Germano Rizzo Maintainer
Hermann J. Beckers Contributor
Nicolas Pouillon Contributor


Resources and communication

AudienceResource typeURI
Bug Tracking,Developer,SupportE-mailmailto:mano@pluto.linux.it
Debian (Ref)https://tracker.debian.org/pkg/gringotts
Ruby (Ref)https://rubygems.org/gems/gringotts


Software prerequisites

KindDescription
Required to uselibmhash
Weak prerequisiteautomake 1.5 or later (both for builing from CVS)
Required to usezlib
Weak prerequisiteautoconf 2.52 or later
Required to uselibbz2
Required to useGTK+
Required to uselibmcrypt
Required to buildpkg-config

This entry (in part or in whole) was last reviewed on 17 April 2018.



Entry






Property "Submitted by" (as page type) with input value "{{{Submitted by}}}" contains invalid characters or is incomplete and therefore can cause unexpected results during a query or annotation process.









































Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the page “GNU Free Documentation License”.

The copyright and license notices on this page only apply to the text on this page. Any software or copyright-licenses or other similar notices described in this text has its own copyright notice and license, which can usually be found in the distribution or license text itself.