MicroStation by Bentley Systems is the trusted computer-aided design (CAD) software built specifically for infrastructure design.
Microstation enables architects, engineers, and designers to create precise 2D and 3D drawings that bring complex projects to life.
MicroStation is the only computer-aided design software for infrastructure design, helping architects and engineers like you bring their vision to life, present their designs to their clients, and deliver their projects to the community.
Learn More
SOCRadar Extended Threat Intelligence Platform
Get real-time visibility into vulnerabilities, leaked data, and threat actor activity targeting your organization.
SOCRadar Extended Threat Intelligence, a natively single platform from its inception that proactively identifies and analyzes cyber threats with contextual and actionable intelligence.
Barada (Barada Aint Respecting Any Deceptive Adversaries) is a PAM module designed to provide two-factor authentication support. There is companion software called Gort which runs on Android devices, essentially turning your phone into a SecureID token.
The PAM module is available in the repositories for Debian based distributions.
Gort, the Android client, is available from the android market (https://play.google.com/store/apps/details?id=net.sf.crypt.gort)
Simple file encryption utility with AES-256 for Windows 2000/2003/XP/Vista/7. Beside the standard enc/decryption operations has a Cut/Copy and Paste like interface.
A distance vector routing protocol based on delay for IPv4 & IPv6
A new routing protocol called Delay Based Routing Protocol (DBRP). It is a flexible distance vector routing protocol with a metric based on delay. It natively supports IPv4 and IPv6, and can also carry information for common services such DNS servers
We make IT management effective and simple. Easily observe your networks, servers, cloud services, containers, devices and applications.
NetCrunch is a smart, agentless network monitoring and management software system capable of monitoring every device in a network. Developed by AdRem Software, NetCrunch helps businesses of all sizes remotely monitor network services, switches, routers, bandwidth utilization, and traffic flow and visualize their system performance.
Rcrypto is the encryption and decryption software for windows XP,vista and 7 to keep your data secure from unauthorized users. It uses the highly secure algorithm to encrypt every byte of the file.
ENIGMA 2000 is a reliable file encrypter for DOS shell
...Tests state that a huge input file just with zeros, will return an output file whose frequency analysis is white noise.
It uses six phases to encrypt any file and the phases sequence depends on the password.
On phase 5, it uses the Rubik's cube paradigm to encrypt the data.
It's extremly reliable and the password varies between 8 and 16 characters.
The execution syntax is:
coder.exe [file to encode] [password (min 8 char, max 16)] [mode ('c'oder 'd'ecoder)]
Enjoy it
Object Monitor is an accessible and handy software that allows you to control the integrity of your files and registry keys.
You can also set Object Monitor to automatically verify your applications and files on system start-up or at a preset time.
See what everyone is allocated to. Projects, clients, meetings - all in one tool.
The fast, simple way to schedule people, equipment and other resources online.
Designed to replace clunky, old scheduling spreadsheets, Resource Guru helps managers get organized fast. The platform covers resource planning, resource scheduling, resource management, staff leave management, reporting, and more.
CaesarCipher is a simple tool which helps you de/encrypt texts with the caesar cipher. This tool should not be used to encrypt sensitive data like passwords or personal information.
DocUMentDS is a cross platform desktop document management system. Story and any file or document type with ease. DocUMentDS runs on 32 and 64 bit systems. AES-256 encryption is planned for next releases.
SD4L is a suite of Linux tools including a graphical user interface which allow the creation of, and access to ScramDisk as well as TrueCrypt encrypted container files. In particular, SD4L provides a Linux driver which enables mounting of containers.
Implementation of Rijndael, RSA and El Gamal ciphers as well as SHA256, Blake and Blue midnigh wish hash functions. The program is for encrypting files but it can be rewritten for other purposes.
Expand a TrueCrypt volume on the fly without reformatting. All kind of volumes (container files, disks and partitions) formatted with the NTFS file system are supported.
Anoubis is a Security Suite which implements a secured environment for applications. The core of the suite is an Application Firewall alongside with a Sandbox. Mechanisms to assure the authenticity of files, directories and applications are provided.
yaSSL, or yet another SSL, is an embedded ssl library for programmers building security functionality into their applications and devices. yaSSL is highly portable, and runs on standard as well as embedded platforms(QNX, ThreadX, VxWorks, Tron)
yaSSL is still available but no longer being developed. Current development on the same project continues under wolfSSL. Visit yaSSL Home above for the latest stable release.
Tool for encrypting files using blowfish, aes, des or cast5,
File hashing with md5, sha and ripemd160,
compresssion with gzip, and a nice user interface.
Created using C++ with Qt framework, depends on QCA third-part Qt Library and OpenSSL.
Perfenc is a encryption program that encrypts/decrypts files or the standard input with a one-time pad.
More information about one-time pads is available at http://en.wikipedia.org/wiki/One-time_pad
Simple tool for file encryption and folder content encryption with AES 256. Files can also be hashed with a SHA1 signature. A command line version is available as well as a GUI version. One other useful feature is to encrypt messages for emails.
Allows to transparently encrypt repository contents with AES 256. The main advantage is that no additional software needed to be installed in untrusted location. Files are automatically encrypted on the fly when doing git push from trusted location.
Utility to encrypt files and streams. Features: encryption with AES, Serpent, Twofish and many other block ciphers supported by Botan; PBKDF2 key derivation; HMAC verification; does not require files, works with pipe input and output
A program to calculate and verify checksums of multiple files with wizard-like GUI. Supports 12 hashes: CRC32, MD2, MD4, MD5, SHA1, SHA2, RIPEMD,Whirlpool, ED2K, AICH, Tiger, TTH. Allows processing of nested directories and updating of checksum files