Open source applications Keep You Safe


 
Thread Tools Search this Thread
Special Forums News, Links, Events and Announcements UNIX and Linux RSS News Open source applications Keep You Safe
# 1  
Old 04-21-2008
Open source applications Keep You Safe

Mon, 21 Apr 2008 20:00:00 GMT
Personal data safety is big business lately. There are a variety of ways to protect your identity or keep your personal information from the prying eyes of dishonest people, but Eric Wolbrom has what he believes is a unique service. Keep You Safe makes it possible for subscribers to store all their personal data securely in a virtual online "safe deposit box," and share the key with someone they trust. When Wolbrom, a self-described "security geek," finally had the chance to launch Keep You Safe, he knew that building it on Linux, Apache, MySQL, and PHP (LAMP) was the best way to keep his customers' data secure.


Source...
Login or Register to Ask a Question

Previous Thread | Next Thread

3 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Open Source

Hi Friends I'm new to this UNIX - I'm working on the porting project from Solaris To Linux i just want to map some commands from solaris to Linux so can any one please tell me how to get the source code of the commands like "ls", "cu", "du" Regards sabee (1 Reply)
Discussion started by: sabee.prakash
1 Replies

2. Solaris

Async-Signal-Safe versus MT-Safe

Hi, I am Solaris 9 developer and notice that the documentation does not provide a clear notion of the inherent concurrency in routines defined as "Async-Signal-Safe". Routines defined as "MT-Safe" obviously have the best level of concurrency, compared to normal "Safe" interfaces. I have... (1 Reply)
Discussion started by: tristan12
1 Replies

3. IP Networking

Open Source NMS

Hello there, I wanted to know the members' opinion about the best open source network management software which uses a web browser to show its interface and results. I am interested in the software for both windows and Linux OSs. Thanks. (4 Replies)
Discussion started by: Jawwad
4 Replies
Login or Register to Ask a Question
CONCH(1)																  CONCH(1)

NAME
tkconch - connect to SSH servers graphically SYNOPSIS
conch [-l user] [-i identity [ -i identity ... ]] [-c cipher] [-m MAC] [-p port] [-n] [-t] [-T] [-V] [-C] [-N] [-s] [arg [...]] conch --help DESCRIPTION
The --help prints out a usage message to standard output. -l, --user <user> Log in using this user name. -e, --escape <escape character> Set escape character; 'none' = disable (default: ~) -i, --identity <identity> Add an identity file for public key authentication (default: ~/.ssh/identity) -c, --cipher <cipher> Cipher algorithm to use. -m, --macs <mac> Specify MAC algorithms for protocol version 2. -p, --port <port> Port to connect to. -L, --localforward <listen-port:host:port> Forward local port to remote address. -R, --remoteforward <listen-port:host:port> Forward remote port to local address. -t, --tty Allocate a tty even if command is given. -n, --notty Do not allocate a tty. -V, --version Display version number only. -C, --compress Enable compression. -a, --ansilog Print the received data to stdout. -N, --noshell Do not execute a shell or command. -s, --subsystem Invoke command (mandatory) as SSH2 subsystem. --log Print the receieved data to stderr. DESCRIPTION
Open an SSH connection to specified server, and either run the command given there or open a remote interactive shell. AUTHOR
Written by Moshe Zadka, based on conch's help messages REPORTING BUGS
To report a bug, visit http://twistedmatrix.com/bugs/ COPYRIGHT
Copyright (C) 2002-2008 Twisted Matrix Laboratories. This is free software; see the source for copying conditions. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICU- LAR PURPOSE. SEE ALSO
ssh(1) October 2002 CONCH(1)