The Best Mentoring Software For Engagement, Sustainability and High Impact!
All In One Solution To Manage Successful And Sustainable Mentoring Programs.
The Best Mentoring Software For Engagement, Sustainability and High Impact!
All in One Solution to Manage Successful Mentoring Programs. Top Organizations And Award-Winning Programs Are Using Mentornity
Try for Free
Create and run cloud-based virtual machines.
Secure and customizable compute service that lets you create and run virtual machines.
Computing infrastructure in predefined or custom machine sizes to accelerate your cloud transformation. General purpose (E2, N1, N2, N2D) machines provide a good balance of price and performance. Compute optimized (C2) machines offer high-end vCPU performance for compute-intensive workloads. Memory optimized (M2) machines offer the highest memory and are great for in-memory databases. Accelerator optimized (A2) machines are based on the A100 GPU, for very demanding applications.
Scour: a Perl script able to find lines in log files matching a given Perl regular expression. It counts matches within given time periods, and reports on whether the number of matches exceeds a given count, shows matching lines, or executes a command.
stores a free text field strongly encrypted on a cell-phone or PDA using AES encryption with 256 bit -- can be used for storing passwords, pins and other sensitive data
Szyfrator is a GUI application for Windows XP/Vista/7. It encrypts and decrypts text messages using the public RSA algorithm. It generates two 256 bit keys: public and private and was designed to be very easy to use.
Command line encryption tool for one time, daemon, or stream data processing. Data stats, check sums, conversion to/from text. Data/keys from files, pipes, standard input. In-place/diverted processing or data-analysis-only. Random, file, password keys.
Centralized Workload Automation and Job Scheduling
Orchestrate your entire tech stack with our no-code connectors and low-code REST API adapter
Orchestrates any process from a single point of control. Build reliable, low-code workflows in half the time. Develop end-to-end business and IT processes faster with hundreds of drag-and-drop actions. Coordinate enterprise-wide MFT processes using dozens of prebuilt actions for common file operations.
DataEcho is a TCP session reconstruction utility. It can capture traffic directly from a network adapter or can use a pcap file as input. DataEcho allows the playback of a user's web browsing, email, or other text-based protocol activity.
Cryptomni is a program which can encrypt and decrypt files using the one-time pad cipher. If a key is truly random, kept secret, and never reused, this encryption algorithm can be proven to be unbreakable.
secureDATA is a simple and easy to use encrypted personal information manager. It can store both textual information (passwords, usernames, electronic receipts, etc), and (as of v1.6) files. It uses AES-128 encryption via the Python Cryptography Toolkit.
Flexible time and billing software that enables teams to easily track time and expenses for payroll, projects, and client billing.
Because time is money, and we understand how challenging it can be to keep track of employee hours. The constant reminder to log timesheets so your business can increase billables, run an accurate payroll and remove the guesswork from project estimates – we get it.
Net.MD5 is a handy MD5 checker and generator. It can encode unlimited bytes of data into 32bit key, and auto compare against original key. A visual GUI will keep MD5 more friendlier. It was written in C# under .NET Framework 2.0
Simplebackup is a cross-platform backup program. It reads a configuration file then builds a compress backup set, finally places the compressed files into another location (a directory, a remote http,ftp,sftp server or even one or more email accounts).
Universal Account Creator (UAC) automates posting of form data to websites,
Checking web-based emails at set intervals, gathering Optical Character Recognition data from http hosted images, and gathering addition html context,
all configured by txt files
phpCA is a PHP-based framework to operate a certificate authority (CA). It uses the openssl functions of PHP to generate CSRs and X.509-certificates as well as mySQL to store these data.
Securely store unstructured data in (keyword, record) pairs. Both keywords and record data are encrypted. Ideal for storing passwords, account information, etc. Thus, srd is a general-purpose password vault or a secure rolodesk application.
Cryptology is a Windows shell application that enables users to easily protect their files. It incorporates military grade encryption (256 AES) and secure shredding into a simple user interface
Package for coding and decoding files with Matheos algorithm from commandline or console in Linux/Unix Environment. Based on Keys stored in files or as hardware locks (on devices). Fast and strong coding. Fast encoding.ONLY BINARY PACKAGES FOR NOW!
vSentinel is a customizable 3D mapping of your network monitoring or security data for real-time or trend-based attack and anomaly detection and analysis.
HashserGUI is a GUI interface for Jacksum. It is intended to provide a graphical tool to create hashes for files within a directory, and check the hashes generated. It works with many hash functions, as md5, sha1, sha256, sha512, md4, crc, etc.
The file recovery process is not an easy task to run on Linux and Unix based OSes and there`s almost no good user interfaces for end users, so that`s why, El Recuperador, is intended to make a generic Web-based GUI framework based on forensics informatic
PHP script to protect DIV content (e.g. private data) from indexation by bots, spammers etc...The content is encrypted in the source and decrypted by entering the key in the CAPTCHA.
B-Trust eDoc is a program built on top of LibDigiDoc a free implementation of the OpenXAdES standard for signing/encrypting files using smartcard tokens. It also contains Openssl and PKCS11 wrapper classes in C++ which might be useful to developers.
Stegeek is very simple tool, that takes several files,encrypt, and mix them into one file. Also add some redundancy. The result is, that we have one archive and N keys. It should not be possible to guess N, if you have archive and up to N-1 keys.
USB System Lock (USL) is the solution to lock your system by a USB drive. USL can work on MP3 Player(with USB port), thumb-size USB storage, card reader...etc. A computer that locked by USL can unlock by the USB drive which contain the correct key only.
MUSASH provides a utility to digest text, file and a byte char. It also able to compare two files, compare file, text and char to a hash. It also allows user to search for a string that evaluates to a hash given. Supported algo: MD5, SHA1 and SHA2 family
Heimdall is a Java content validation framework that addresses checking of data in distributed software systems. Developers are encouraged to identify potentially untrustworthy data sources, and specify validation rules in XML.