We make it cheaper and easier to manage your waitlist, order backlog, and just about any other waiting scenario.
Streamline your customer flow with our SMS-powered waitlist, reservations, and queue management app for restaurants, health care providers, and many other businesses.
Free Trial
Apify is a full-stack web scraping and automation platform helping anyone get value from the web.
Get web data. Build automations.
Actors are serverless cloud programs that extract data, automate web tasks, and run AI agents. Developers build them using JavaScript, Python, or Crawlee, Apify's open-source library. Build once, publish to Store, and earn when others use it. Thousands of developers do this - Apify handles infrastructure, billing, and monthly payouts.
A simple working implementation of 64-bit DES encryption/decryption alogrithm in C++. Could act as guide to undestanding the algorithm. Its buggy so help me out :-)
I needed a library of functions that enabled me to perform hash
functions and symmetric cryptography. I chose MD5 initially but
eventually chose SHA as the hashing algorithm due to concerns regarding
the \'collision resistance\' of MD5 due to weakne
SysK allows to crypt text by using system informations calculate the algorithm.
For each user,the crypt algo will be different.
It's written in C language for Linux x86.
The objective is to allows it to crypt streams, binaries and more.
KCrypto is a KDE2 file encryptor.
It uses the Rijndael ( block cipher algorithm AES winner ) public domain c++ class implementation written by Szymon Stefanek , and it is capable of
encrypting and decrypting every kind of file ( text and binary ) i
CryptoLib is a crypto library for PalmOS based on OpenSSL, which implements BlowFish algorithm, and is intended to support any other crypting algorithm in the future.
sectar: a program that creates encrypted tape archives(tar files), using the AES algorithm Rijndael. Encryption exported under exemption TSU 740.13.
Was star, now sectar.
Distributed cryptosystem based on Shoup’s threshold signature scheme
In distributed cryptosystem a secret key is distributed among the participants of the system, in the way that only a group of some authorized users can perform any actions related to the secret key. A secret key is used to encrypt a session key, create a digital signature and to certify public keys. The system uses symetric encryption algorithm with a session key to encrypt messages. Shoup’s threshold signature scheme has been used for cooperative signing and also for cooperative decryption.
Multi-cloud security delivered — now and in the future.
Designed for organizations operating in the cloud who need complete, centralized visibility of their entire cloud estate and want more time and resources dedicated to remediating the actual risks that matter, Orca Security is an agentless cloud Security Platform that provides security teams with 100% coverage their entire cloud environment.
· A free chat server coded in java.
· Supports secure connections via the Diffie-Hellman-Algorithm.
· One java chat client available.
· Other clients in production.