Search Results for "/storage/emulated/0/android/data/net.sourceforge.uiq3.fx603p/files"

Showing 6 open source projects for "/storage/emulated/0/android/data/net.sourceforge.uiq3.fx603p/files"

View related business solutions
  • Award-winning proxy networks, AI-powered web scrapers, and business-ready datasets for download.
 Icon
    Award-winning proxy networks, AI-powered web scrapers, and business-ready datasets for download.


    How the world collects public web data

    Bright Data is a leading data collection platform, enabling businesses to collect crucial structured and unstructured data from millions of websites through our proprietary technology. Our proxy networks give you access to sophisticated target sites using precise geo-targeting. You can also use our tools to unblock tough target sites, accomplish SERP-specific data collection tasks, manage and optimize your proxy performance as well as automating all of your data collection needs.
    Learn More
  • Remotely access and manage devices to provide on-demand IT support. View the screen and control a remote computer or mobile device. Icon
    Remotely access and manage devices to provide on-demand IT support. View the screen and control a remote computer or mobile device.

    Be Efficient Support Remotely

    ISL Light is an easy-to-use remote desktop software for security-conscious users. It comes at a great price-performance. ISL Light is a powerful tool that helps IT staff and support technicians solve problems remotely, either through unattended access, remote support or even though screen-sharing on mobile devices. It works cross-platform and offers 256-bit encrypted sessions with all standard remote access features plus some important extras: session recording, live chat, videocall, multi-monitor support, file transfer, reporting and many more. Users can choose between cloud or on-premise service. ISL Online license does not limit the number of users, workstations and clients you support. It's a reliable and highly secure software used in all industry sectors including banks, hospitals, governmental institutions and insurances.
    Free Trial
  • 1

    Fritzbox

    Access to the TR64 API of a Fritzbox

    A Fritzbox has an integrated TR64 (SOAP) server which allows to query data and to change the configuration. The project has a Free Pascal (Lazarus) unit to access this API. The unit may be used with Delphi too. There's also a test application (Lazazus) to read the Fritzbox TR64 data and a Deskband to show some Fritzbox data in the taskbar (Lazarus). Last changes: 2021-09-19 Major update and bug fix of FritzboxBand.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    DirectorySync

    Directory synchronization with Drag & Drop

    Directory synchronization with Drag & Drop 20.1.2020 Version 5.6.0 Rolf Wetjen (rolf.wetjen@mail.de)
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    WinShaver

    WinShaver

    Win Utility for cleaning windows

    Win Utility for cleaning windows temp files and other unused stuff. Custom paths for cleaning can be added to WinShaver like: create a file (WinShaver.ini) add sections as you wish, just let Ident be "Path" and value anything you want example: [WinTemp] Path=C:\Windows\Temp [FireFox] Path=C:\Users\fshkodra.KS\AppData\Local\Mozilla\Firefox\Profiles
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    WordReplaceLZ

    WordReplaceLZ

    Utility that replaces words in text files

    Utility that replaces words in text files according to user-defined pattern.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Attack Surface Management | Criminal IP ASM Icon
    Attack Surface Management | Criminal IP ASM

    For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces

    Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
    Learn More
  • 5
    SuggestRun is program like Windows Start>Run menu with suggestions functionality.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    A GUI frontend for the iconv, command line utility of linux. It helps users to convert text files to various codepage encodings.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB