Search Results for "/storage/emulated/0/android/data/net.sourceforge.uiq3.fx603p/files" - Page 72

Showing 2110 open source projects for "/storage/emulated/0/android/data/net.sourceforge.uiq3.fx603p/files"

View related business solutions
  • Run applications fast and securely in a fully managed environment Icon
    Run applications fast and securely in a fully managed environment

    Cloud Run is a fully-managed compute platform that lets you run your code in a container directly on top of Google's scalable infrastructure.

    Run frontend and backend services, batch jobs, deploy websites and applications, and queue processing workloads without the need to manage infrastructure.
    Try for free
  • Globalscape Enhanced File Transfer (EFT) is a best-in-class managed file transfer (MFT) solution Icon
    Globalscape Enhanced File Transfer (EFT) is a best-in-class managed file transfer (MFT) solution

    For Windows-Centric Organizations Looking for Secure File Transfer solutions

    Globalscape’s Enhanced File Transfer (EFT) platform is a comprehensive, user-friendly managed file transfer (MFT) software. Thousands of Windows-Centric Organizations trust Globalscape EFT for their mission-critical file transfers.
    Learn More
  • 1
    FragMend is a GUI tool that allows a forensic investigator to classify and view sectors of raw or unallocated data. The sectors can then be ordered and grouped into files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    winKnocks is an encrypted(DES) port knocking tool. Knock sequences are defined through XML files; users specify: number of packets of each knock sequence, payload and header of each packet. Logging capability. Generation of smoke packets.No replay-attack
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    KIside is a message digest computing and displaying tool. It computes and shows the hash code of any file as a string of hexadecimal numbers. KIside implements standard algorithms such as MD4, MD5, SHA1, SHA256, SHA384, SHA512, TIGER, RIPEMD160.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Shade is a versatile LSB (least significant bit) manipulation and analysis tool used to hide/retrieve files from within other files, such as images. The goal is to make the existence of the hidden file completely undetectable, and optionally encrypted.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Strengthen your current Business intelligence infrastructure by automating reports and manual tasks Icon
    Strengthen your current Business intelligence infrastructure by automating reports and manual tasks

    Select, Format, Schedule and Deliver!

    PBRS™ and CRD®, our standalone report scheduling solutions for Power BI, Microsoft SQL Server Reporting Services® (SSRS) and SAP Crystal Reports®, are designed to supplement and strengthen your current Business intelligence infrastructure by automating reports & manual tasks, layering useful incremental capabilities, and scaling capacity by orders of magnitude. They supercharge operational productivity while lowering administrative costs.
    Free Trial
  • 5
    Open WS-Policy,an Open Source Web Services Policy Framework implementation,is a set of open source Java libraries that implement the ws-policy specifications.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    This is rarbrute, a shell script to brute force encrypted rar files under unix and linux. A long wordlist and a paper about security in internet cafes is included.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Visualize Application and Firewall Logs with Google Earth. A web based PHP parser feeds Google Earth with near realtime data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Open Source Security System for home users as well as for system administrators. Aims at providing an uniform security platform, Operating System Independent, to protect and prevent valuable data from corruption/stealling and destruction.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    LINReS is a tool which can be used by Incident Response and Computer Forensic Teams during initial response phase to collect volatile and other non-volatile data from a compromised Linux machine using statically compiled binaries.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Boon: The Agile Referral Hiring Platform Icon
    Boon: The Agile Referral Hiring Platform

    Tap your entire community to hire better talent, faster

    Boon's agile referral platform expands your recruiting power 
through AI, automation, integrations, and gamification.
    Learn More
  • 10
    cpm is a small console tool to manage passwords and store them public key encrypted in a file - even for more than one person. The encryption is handled via GnuPG so you can access the programs data via gpg as well.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    PAM module which will authenticate user by X509 certificates. Keys must be provided in some automountable location. As storage may be used usb steaks, bluetooth storage devices... Mainly intended for password-less authentication on single user clients pc
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    A spin-off of InstallFix which aimed to use advanced features and external definition files. After partial successes, many obstacles proved too great. However, it does offer some useful options for clearing caches and junk.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Java SWING applet to store encrypted files in your box.net account
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Portable and simple program for text and files encryption (Symmetric, Asymmetric and Steganography)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    ext2hide allows users and administrators to utilize the reserved space of the ext2/3 superblocks to store hidden data on their filesystems, rendering it inaccessible to any normal viewing, yet still residing in permanent storage on disk.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    CivilAction lets you create a Choose Your Own Adventure type story that can be played on Java enabled cell phone. A desktop application lets you write story files. People run the story on their phone. Make a 'Tresure hunt' or 'Amaze Race' type game.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Bisker is a simple cgi scanner written in C language for GNU/linux platforms. It's an useful tool to find critical or dangerous cgis/folders/files on local and remote machines (also through proxy).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Paranoid Android is a security enhancer for Mac OS X. Whenever an application asks the operating system to open a URI, Paranoid Android steps in and asks the user for confirmation before it can be opened.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Iron Bars Shell is a restricted Unix shell. The user can not step out of, nor access files outside the home directory. It is written in C for Linux. No libraries used. It is small, fast, secure. Two ascii configuration files for more control.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    A Visual Basic macro for Outlook 2002 (XP) that exports categories of contacts to vCard files (2.1 and 3.0) and collects email addresses into white and black lists (or just lists). No GUI, the user must use the Outlook macro editor. Click Docs for he
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    deface-no-tnx is an anti-defacement system that monitors your Web files and notifies you about unallowed changes. It also replaces the defaced page with a standard "error" page,so that no offensive/joking content can be frauodolently added to your site
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    YASeMI (Yet Another Security Monitoring Interface) consists of a Web interface that can be of aid to SysAdmins and Security Admins, in detecting possible anomaly or intrusion behaviour in their network, based on Netflow data their routers emit.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Looking to secure your files but don't want to pay for an expensive program? LockedFolder will take files that you add and encrypt them, thus requiring a password to restore them. Perfect for adding to a disk or CD and transporting them between people!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    SAFE Reports is a reporting/audit tool for SiteMinder® Policy Store, a popular Single Sign-On product. Find ease of generating reports from large policy data in seconds! Reports can be exported to major popular formats like HTML, word doc PDF and excel
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Tomahawk is a command line utility that supports high speeds bidirectional replay (300-750 Mbps) of saved tcpdump(8) files. Tomahawk is great for testing the throughput and blocking capabilities of network-based intrusion prevention systems (NIPS).
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB