Search Results for "c:\program files\micronetics\msmws\program\" - Page 4

Showing 216 open source projects for "c:\program files\micronetics\msmws\program\"

View related business solutions
  • Download the most trusted enterprise browser Icon
    Download the most trusted enterprise browser

    Chrome Enterprise brings enterprise controls and easy integrations to the browser users already know and love.

    Chrome Enterprise is ideal for businesses of all sizes, IT professionals, and organizations looking for a secure, scalable, and easily managed browser solution that supports remote work, data protection, and streamlined enterprise operations.
    Learn More
  • Create stunning, professional email signatures in minutes Icon
    Create stunning, professional email signatures in minutes

    For companies looking to create, assign and manage all their employees email signatures and add targeted marketing banners.

    Create, assign and manage all your employees’ email signatures and add targeted marketing banners. Stop getting worked up about your signatures! Leverage a centralized interface to easily create and manage the email signatures of all your employees. Take advantage of each email to broadcast and amplify your brand. Letsignit helps you regain control over your digital identity. Harmonize 100% of your employee’s email signatures in just a few clicks! 121 professional emails are received and 40 are sent every day by an employee. With Letsignit, turn every email into a powerful communication opportunity: send the right message to the right person at the right time! Innovative more than tech, inspiring more than following. Authentic more than overrated, close more than "think big", trustworthy more than doubtful. Hands-on more than complex, available but yet premium, fun but yet expert.
    Learn More
  • 1

    File Obfuscator

    Scramble files to enhance security

    File Obfuscator is small programme capable of scrambling the bytes of a file to make them difficult to acces without the proper password.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Codegroup

    Codegroup

    A Java application for transferring computer files in 5 letter groups

    Codegroup is a Java application that will allow one to convert binary (or text) computer files in to 5 letter codegroups for transmission over email, landline telephones, radioteletype or Morse Code. Codegroup has internal error correction & limited cryptography capabilities. Codegroup : ZZZZZ YBPIL AIAIG FMOPP CPAAA DGNGP GPGPA ADNJN ELJKO ELIMO GEOHF KIFGP IFBCB PKCPI YJMHE PHBHP PPOBH NCOHD AKLLL AGHFP DEGEF LKELC EAIJI ABAGP AHPPO IHHPH OHPDF YNFPB ALEPO KMPKP Once this program has a graphical user interface, an Enigma like subsystem must be devised for data whitening. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    MLCrypt

    Simple, lightweight, standalone command-line single file encryption.

    Simple, lightweight, cross-platform (Windows / Linux / ARM6 Linux), cross-arch (x32 / x64), standalone command line file encryption program. GnuPG is probably the best application for cross-platform encryption. However, its usage on Windows PCs may be inconvenient (installation administrator rights; large executable size for perhaps just a one-time file decryption, complicated command-line switches for stronger encryption). NCrypt would fulfill this task, but does not operate on 64-bit Windows - MLCrypt was created because of this. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    Substitution Cipher Decryption

    Decrypt messages encrypted with a substitution cipher

    The provided program helps the user with the deciphering of a substitution cipher with the 26 letter alphabet by providing the following features • Dynamic entering of ciphertext. Ciphertext can be modified at any point of the process. • Easy location of corresponding characters in the ciphertext and the substituted text by selection. • Fast frequency analysis for single letters, bigrams, trigrams and quadgrams (more N -grams can be made available by adding a single line of code)...
    Downloads: 0 This Week
    Last Update:
    See Project
  • The most advanced C and C++ source code analyzer Icon
    The most advanced C and C++ source code analyzer

    Combining the benefits of static and dynamic source code analysis to deliver the most advanced & exhaustive code verification tool.

    TrustInSoft Analyzer is a C and C++ source code analyzer powered by formal methods, mathematical & logical reasonings that allow for exhaustive analysis of source code. This analysis can be run without false positives or false negatives, so that every real bug in the code is found. Developers receive several benefits: a user-friendly graphical interface that directs developers to the root cause of bugs, and instant utility to expand the coverage of their existing tests. Unlike traditional source code analysis tools, TrustInSoft’s solution is not only the most comprehensive approach on the market but is also progressive, instantly deployable by developers, even if they lack experience with formal methods, from exhaustive analysis up to a functional proof that the software developed meets specifications.
    Learn More
  • 5

    Chaos Encrypter

    Encrypter that use chaos system

    This project contain two program: one is a text encrypter, this program can encrypt any file. Another is image encrypter, this program is designed to encrypt picture that can include alpha channel. You'd better use png format to save if you use image encrypter. Note: These programs are still experimental. If you want to use these programs, be care.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Maroniecoder

    Maroniecoder

    Encrypt a text through a list of encryption methods

    I came to the conclusion that this program is not worth the time for further development. Use different Encryption methods with parameters to en- or decrypted a text through the list With downloadable source-code since 1.3 You need to have Java installed http://www.oracle.com/technetwork/java/javase/downloads/index.html
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    LastBit Suite

    LastBit Suite

    A steganographic program to hide files into images

    This is a steganogric program that uses images last bits to hide information ( files ). It can crypt data with a rotation and a xor key.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    vigenere.py

    vigenere.py

    this simple program implements the Vigenere cipher in python

    For details of this cipher see; http://en.wikipedia.org/wiki/Vigenere_cipher This cipher can be broken by frequency analysis, this is a toy project, and should not be used in situations where security is important.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    The Martus (TM) Bulletin System is used by human rights and social justice groups to track violations. This Java program is as easy to use as email. Bulletins can be encrypted or searched, and can be backed up to a remote server. See www.martus.org.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Network Performance Monitoring | Statseeker Icon
    Network Performance Monitoring | Statseeker

    Statseeker is a powerful network performance monitoring solution for businesses

    Using just a single server or virtual machine, Statseeker can be up and running within minutes, and discovering your entire network in less than an hour, without any significant effect on your bandwidth availability.
    Learn More
  • 10

    Cryptkeeper

    Cryptkeeper Secuirty tool

    In this program you will find tools like : Rawdata tool , file encryption , text encryption , program updater , program protecter , password manager , program settings , defult settings , settings viewer and the last is the file hashing. the file hashing you can use 6 hashing types for the file encryption 1 since i ran out of time for it , and the text encryption has 17 different types 12 encrypt and 5 hashing types.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    puff

    puff

    Fast and Strong Data Encryption Algorithm

    svn checkout http://umcipher.googlecode.com/svn/trunk/ umcipher-read-only
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Store several passwords with a single portable program. Just remember only one password. It's up to you to decide how many password you want to store, and which name you want to give to that password.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    TinyCrypt is a simple secure program for encrypting files. The core encryption code is only 76 lines of C code, based on the well known ARC4-D(768) algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    BMP Coder is a free program that allows you to encode any file into a bmp image. It can be useful e.g. to hide some confidential data.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    SteganoImage
    Utility for embedding hidden data into PNG files
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Anti net-cut program, programme Anti net-cut, anti netcut, ,netcut , Arcai
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    TBFAA/encoder
    A program that encrypts multiple files. It uses new encryption algorithms, such as a Three-Block Feistel chiper, ArchFurry's algorithm and a new hash function. Licensed under the ISC.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Implementation of Rijndael, RSA and El Gamal ciphers as well as SHA256, Blake and Blue midnigh wish hash functions. The program is for encrypting files but it can be rewritten for other purposes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    SD4L is a suite of Linux tools including a graphical user interface which allow the creation of, and access to ScramDisk as well as TrueCrypt encrypted container files. In particular, SD4L provides a Linux driver which enables mounting of containers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Program for brute force recovering a Oracle password hash. This is my first ever Linux program(after some hello world programs) Still learning how to program C
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    RC4-32.ASM

    Code to brute force the 32-bit key used to RC4 encrypt .pwl files.

    PROJECT HAS MOVED TO GITHUB: https://github.com/alex-georgiou/rc4-32.asm Code to brute force the 32-bit key used to RC4 encrypt .pwl files. Assembles to a 992 byte .COM file using the Intel Architecture Assembler v1.0 Copyright (c) 1998 augusto at dcc.ufmg.br. http://web.archive.org/web/19981205090800/http://www.dcc.ufmg.br/~augusto/project/iasm.zip
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    cst allows to split (or share) "secret" files, like private keys, into number of equal parts. After that, secret can only be recovered by collecting all parts together. If any of this parts is lost, the secret is lost too.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Library to encode and decode text or files to base64.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Anoubis is a Security Suite which implements a secured environment for applications. The core of the suite is an Application Firewall alongside with a Sandbox. Mechanisms to assure the authenticity of files, directories and applications are provided.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Perfenc is a encryption program that encrypts/decrypts files or the standard input with a one-time pad. More information about one-time pads is available at http://en.wikipedia.org/wiki/One-time_pad
    Downloads: 0 This Week
    Last Update:
    See Project