CTparental is a free and open-source parental control tool used to control computer usage or internet browsing. It comes with a simple and easy-to-use web interface powered by a Lighttpd web server. The idea of CTparental tool comes from other tools such as, iptables, dnsmasq, and inguardian privoxy.
Project Calico is a new approach to virtual networking and network security for containers, VMs, and bare metal services, that provides a rich set of security enforcement capabilities running on top of a highly scalable and efficient virtual network fabric.
Explains how to install and use Gixy tool to analyze Nginx configuration to prevent security misconfiguration and automate flaw detection on Linux or Unix-like system.
Public key crypto for everyone, publicly auditable proofs of identity. Keybase is a new and free security app for mobile phones and computers. For the geeks among us: it's open source and powered by public-key cryptography. Keybase is for anyone. Imagine a Slack for the whole world, except end-to-end encrypted across all your devices. Or a Team Dropbox where the server can't leak your files or be hacked.
J. Zhang, X. Hu, J. Jang, T. Wang, G. Gu, and M. Stoecklin. IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications, page 1-9. (April 2016)
L. Grunske, and P. Zhang. Proceedings of the the 7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering, page 183--192. New York, NY, USA, ACM, (2009)
L. Lee, Y. Juan, K. Lee, W. Tseng, H. Chen, and Y. Tseng. Proceedings of the 2012 ACM conference on Computer and communications security, page 992--994. New York, NY, USA, ACM, (2012)
A. Bozzon, T. Iofciu, W. Nejdl, A. Taddeo, and S. Tönnies. 1st International Workshop on Collaborative Open Environments for Project-Centered Learning, September 2007, Crete, Greece, Sissi, Lassithi, Crete, CEUR Workshop Proceedings, (2007)
B. Zhu, J. Yan, Q. Li, C. Yang, J. Liu, N. Xu, M. Yi, and K. Cai. CCS '10: Proceedings of the 17th ACM conference on Computer and communications security, page 187--200. New York, NY, USA, ACM, (October 2010)