A no-code toolkit for building responsive and resilient mobile business applications for Microsoft Power Platform, Dynamics 365, Dataverse and Salesfo
Deploying mobile apps with Resco takes days, not months—all without writing a single line of code. Workers can download the Resco app from AppStore, Google Play, or Windows Store, log into your company environment, and instantly use the app you have published on any device.
Learn More
PageDNA: Web-to-Print eCommerce Software
eCommerce for Print, Signs and Fulfillment Trusted by In‑Plants and Commercial Print Leaders
PageDNA enables successful eCommerce strategies for commercial print sales organizations, internal print shops, and brand owners. PageDNA’s online ordering platform increases print volume while decreasing touch costs for all stakeholders: clientele, print operations, and the organizations they support.
KeyStone is an editor program for Java keystore files, licensed under the GPL. KeyStone may help make your life easier if you're working with symmetric cryptography in Java.
FSFS is a secure distributed file system in user space built over FUSE and OpenSSL. It stores AND transfers data between clients and server in secure form, leaving most of the cryptography to the clients, thus relieving the server of the additional work.
Bork is a very small, cross-platform file encryption utility. It is written in Java and designed to be included along with the files it encrypts for long-term storage (eg on CD-R). Its minimal external dependencies make it fairly futureproof.
Instant Remote Support Software. Unattended Remote Access Software.
Zoho Assist, your all-in-one remote access solution, helps you to access and manage remote devices.
Zoho Assist is cloud-based remote support and remote access software that helps you support customers from a distance through web-based, on-demand remote support sessions. Set up unattended remote access and manage remote PCs, laptops, mobile devices, and servers effortlessly. A few seconds is all you need to establish secure connections to offer your customers remote support solutions.
The main philosophy of the project is "the best protection a bad password can give". People will choose bad password as long as they have this option, so Neocryptex builds a strong crypographical defence between the password and encrypted data.
stores a free text field strongly encrypted on a cell-phone or PDA using AES encryption with 256 bit -- can be used for storing passwords, pins and other sensitive data
Cryptomni is a program which can encrypt and decrypt files using the one-time pad cipher. If a key is truly random, kept secret, and never reused, this encryption algorithm can be proven to be unbreakable.
flowdit is a connected worker platform tailored for industry needs in commissioning, quality, maintenance, and EHS management.
Optimize Frontline Operations: Elevate Equipment Uptime, Operational Excellence, and Safety with Connected Teams and Data, Including Issue Capture and Corrective Action.
secureDATA is a simple and easy to use encrypted personal information manager. It can store both textual information (passwords, usernames, electronic receipts, etc), and (as of v1.6) files. It uses AES-128 encryption via the Python Cryptography Toolkit.
HashserGUI is a GUI interface for Jacksum. It is intended to provide a graphical tool to create hashes for files within a directory, and check the hashes generated. It works with many hash functions, as md5, sha1, sha256, sha512, md4, crc, etc.
PHP script to protect DIV content (e.g. private data) from indexation by bots, spammers etc...The content is encrypted in the source and decrypted by entering the key in the CAPTCHA.
Stegeek is very simple tool, that takes several files,encrypt, and mix them into one file. Also add some redundancy. The result is, that we have one archive and N keys. It should not be possible to guess N, if you have archive and up to N-1 keys.
MUSASH provides a utility to digest text, file and a byte char. It also able to compare two files, compare file, text and char to a hash. It also allows user to search for a string that evaluates to a hash given. Supported algo: MD5, SHA1 and SHA2 family
An implementation of Shoup's "Practical Threshold Signature" in Java. This is an (n,k)-threshold signature system: at least k parties out of n must independently sign a piece of data to produce a valid group signature.
INTIX-JSIGNER is a java web application for signing documents (XML and/or PDF) of unattended way and in the server side. It has as main modules the following: Authentication, XML and PDF Signing and Keys and Certificates Management.
The Eclipse XML-Security Plug-In allows you to experiment with the W3C recommendations on digital signatures and encryption and to learn all about their background. Arbitrary XML documents can be canonicalized, signed, verified and en- or decrypted.
Enigweb is a firefox extension similar to the Thunderbird Enigmail extension. It will encrypt or sign textareas, and decrypt/verify OpenPGP data. Additionally extensions will be provided for major webmail providers.
The Moonbounce API is a set of high level objects that encapsulate pieces of the Bouncycastle lightweight crypto API. Moonbounce significantly simplifies RSA key generation, signing, encryption/decryption and verification of both byte arrays and files.
CivilAction lets you create a Choose Your Own Adventure type story that can be played on Java enabled cell phone. A desktop application lets you write story files. People run the story on their phone. Make a 'Tresure hunt' or 'Amaze Race' type game.
Flash/PHP adaptation of the XTEA encryption algorithm. Allows encryption/decryption of sensitive data using 128-bit key. May be used for network data (HTTP) or offline for implementations like secure CD-ROM projects.