Supercharge Your Manufacturing with Easy MRP and MES Software
Designed for SME manufacturers who want to reduce wasteful manual processing, save time and increase profits.
Flowlens eliminates stock-outs, shortage and overstocks, avoiding costly production delays.
Stay in control of inventory levels and keep production running smoothly with real-time visibility and easy-to-use stock management. Import bulk data with ease.
Learn More
Optimize every aspect of hiring with Greenhouse Recruiting
Hire for what’s next.
What’s next for many of us is changing. Your company’s ability to hire great talent is as important as ever – so you’ll be ready for whatever’s ahead. Whether you need to scale your team quickly or improve your hiring process, Greenhouse gives you the right technology, know-how and support to take on what’s next.
A quick and easy to use SHA1 calculator for Windows, using C# & .net. (very) Similiar in style to winMD5Sum; supports filenames passed on the command line & files drag+dropped on!
Tool for encrypting files using blowfish, aes, des or cast5,
File hashing with md5, sha and ripemd160,
compresssion with gzip, and a nice user interface.
Created using C++ with Qt framework, depends on QCA third-part Qt Library and OpenSSL.
This project aims at porting visual cryptography, which only works with transparent slides, to ordinary 80g/m^2 white paper. Please read the documentation before using the program.
Simple tool for file encryption and folder content encryption with AES 256. Files can also be hashed with a SHA1 signature. A command line version is available as well as a GUI version. One other useful feature is to encrypt messages for emails.
AI-Powered Security and IT Operations Without Compromise.
Built on the Graylog Platform, Graylog Security is the industry’s best-of-breed threat detection, investigation, and response (TDIR) solution. It simplifies analysts’ day-to-day cybersecurity activities with an unmatched workflow and user experience while simultaneously providing short- and long-term budget flexibility in the form of low total cost of ownership (TCO) that CISOs covet. With Graylog Security, security analysts can:
Allows to transparently encrypt repository contents with AES 256. The main advantage is that no additional software needed to be installed in untrusted location. Files are automatically encrypted on the fly when doing git push from trusted location.
Utility to encrypt files and streams. Features: encryption with AES, Serpent, Twofish and many other block ciphers supported by Botan; PBKDF2 key derivation; HMAC verification; does not require files, works with pipe input and output
This is a more secure file encryption program which uses SERPENT cipher and WHIRLPOOL+SHA-256 hash functions in key creation and for integrity checking.
A program to calculate and verify checksums of multiple files with wizard-like GUI. Supports 12 hashes: CRC32, MD2, MD4, MD5, SHA1, SHA2, RIPEMD,Whirlpool, ED2K, AICH, Tiger, TTH. Allows processing of nested directories and updating of checksum files
Stores and retrieves files in an encrypted archive. Also manages files stored on CDs and DVDs. Other functions are incomplete. PLEASE NOTE: you need to download both an Objectify release and a Public Objects release.
Manage and optimise Google, Facebook and Microsoft Ads faster and gain a competitive advantage with our digital advertising platform.
Smarter, more effective advertising
Slash the time it takes to manage and optimize your Google, Microsoft Advertising or Facebook Ads campaigns to just minutes a day.
Adzooma's AI and machine learning based PPC platform offers stress free campaign management, state of the art 24/7 optimization and advanced automation, all in a simple to use interface.
Scan for 50+ improvement 'opportunities', many of which can be actioned with a single click, track PPC performance and highlight over/under spending to improve your quality score, conversions and ROI.
These trying times are tough for all. So we're giving away our whole award-winning platform for free until June 1st 2020. That's automated PPC ads, one-click optimisations, and world-class reporting - at zero cost. No strings attached. No credit card required.
This program can encrypt / decrypt strings with the Caesar's Cipher.
It also can try to crack an encrypted string with brute force.
(C) Daniel Steinhauer <pik-9@users.sourceforge.net>
Hide your data from any scans for fingerprints at forensic analysis. Fragger is an concept to fragment files into many small files by scrambling the content of the source file.
The aim of this small program is to parse your address book (Evolution address book or VCard file for the moment) and check if some of your contacts have uploaded a PGP public key on a key server.
Power Hasher is a program that allow you to get the hash code of multiple files at once, and export the results to a file, making easy for this file to be imported and the files checked. Currently it supports MD5, SHA1, SHA256, SHA384 and SHA512.
Lite Security Module: a daemon to handle PKCS11 Secure Boxes
Lite Security Module: a daemon to handle Secure Boxes (files containing cryptographic keys, X509 certificates and data objects), accessible through a PKCS#11 library, supporting non-certified (lite) Software or Hardware Security Modules (www.clizio.com)
New, Improved version of VB.Net Registration System. It sends emails to alert you when someone registers your program, if they try to use a used key, and if they try to use a banned key/their key has been banned. Checks every time against ban list.
A GUI (Graphic User Interface) for the OpenSSL encrypting/decrypting mode.
It allows to protect your files without use the console.
GOpenSSL is written with the Mono C# language and the graphic uses the Mono GTK libs.
The CRY utility provides the ability to perform AES-256 symmetric key encryption of files. This is a light weight Linux utility and does not depend on PKI infrastructure. Rather, pre-shared encryption keys are used to protect your files.
This its a simple project of the RSA algorithm. The purpose of this project isn't to develop an impressive program, it's an easy understand of the algorithm and the C programing.
Extend the functionality of the mount and the umount commands by adding support for basic device mapper devices, for key files and scripts and for filesystem checking at mount time while retaining support for loop device encryption.
Project Sypher is a Java program that is intended to take a document and cipher the text, output the result in a new document and delete the original file.