themighty1 / lpfwLinks
Linux Personal Firewall
☆113Updated 4 years ago
Alternatives and similar repositories for lpfw
Users that are interested in lpfw are comparing it to the libraries listed below
Sorting:
- A modern GNU/Linux firewall for GNOME☆389Updated 7 years ago
- Subgraph Application Firewall☆106Updated 6 years ago
- no longer maintained, check the forks for maintained versions☆93Updated 10 years ago
- Tor support for apt☆50Updated 9 years ago
- Protected E-mail Headers☆73Updated 5 years ago
- PaX exception daemon - Temporarily abandoned due to the PaX and grsecurity patches becoming private☆41Updated 8 years ago
- A Firefox extension for whitelist driven safe JavaScript execution.☆80Updated 6 years ago
- GPG plugin for Pidgin☆100Updated last year
- Hardware authentication for Linux using ordinary USB Flash Drives.☆150Updated 10 months ago
- OpenSSL/GnuPG encryption/signing gui for Linux implemented with Python & PyGTK☆72Updated last year
- Kernel module used by Douane firewall☆23Updated 7 years ago
- See the new issue tracker for GrapheneOS at https://github.com/GrapheneOS/os_issue_tracker.☆112Updated 6 years ago
- Daemon process for the Douane firewall☆19Updated 6 years ago
- 🔑 This fork adds YubiKey support☆39Updated 8 years ago
- Qubes component: antievilmaid☆149Updated 10 months ago
- Override resolv.conf through environment variables☆54Updated 4 years ago
- Configuration to use gpg smartcards for ssh authentication☆112Updated 4 years ago
- Secure Internet Live Conferencing☆65Updated 8 years ago
- Subgraph OS issues repository☆73Updated 8 years ago
- Free and simple TrueCrypt/VeraCrypt Implementation based on dm-crypt☆560Updated last year
- A secure text messaging application for Android.☆72Updated 8 years ago
- An Ansible role for using tor!☆72Updated 9 years ago
- Wrapper scripts for building hardened executables by default (deprecated, replaced by standard Arch Linux toolchain changes)☆30Updated 9 years ago
- Refresh your GnuPG keyring without disclosing your whole contact list to the world☆228Updated 2 years ago
- An evil teddy bear that steals your secrets☆39Updated 7 years ago
- fixubuntu.com☆276Updated 10 years ago
- PAM module for two-factor authentication through signal.☆35Updated 7 years ago
- DHCP client disclosing less identifying information.☆61Updated 4 years ago
- OZ: a sandboxing system targeting everyday workstation applications☆437Updated 7 years ago
- Subgraph OS Handbook☆122Updated 7 years ago