Search Results for "/storage/emulated/0/android/data/net.sourceforge.uiq3.fx603p/files" - Page 78

Showing 2110 open source projects for "/storage/emulated/0/android/data/net.sourceforge.uiq3.fx603p/files"

View related business solutions
  • Project Management Software Icon
    Project Management Software

    Understand how PI® can automate your processes

    Project Insight offers powerful tools for project managers and teams in order to deliver optimal performance and ensure success. An enterprise project and portfolio management software, Project Insight offers personalized dashboards, intelligent scheduling, resource management, collaboration, time and expense tracking, project and portfolio tracking, workflow, and reporting features to help teams work better and get real results. Project Insight is suitable for small teams, mid-market companies, and large enterprises.
    Learn More
  • Infor M3 ERP Icon
    Infor M3 ERP

    Enterprise manufacturers and distributors requiring a solution to manage and execute complex processes

    Efficiently executing the complex processes of enterprise manufacturers and distributors. Infor M3 is a cloud-based, manufacturing and distribution ERP system that leverages the latest technologies to provide an exceptional user experience and powerful analytics in a multicompany, multicountry, and multisite platform. Infor M3 and related CloudSuite™ industry solutions include industry-leading functionality for the chemical, distribution, equipment, fashion, food and beverage, and industrial manufacturing industries. Staying ahead of the competition means staying agile. Our new capabilities bring improved data-driven insights and streamlined workflows to help you make informed decisions and take quick action.
    Learn More
  • 1
    Logcheck is software package that is designed to automatically run and check system log files for security violations and unusual activity. Logcheck utilizes a program called logtail that remembers the last position it read from in a log file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Encrypt-roller is a encryption/decryption package. The goal of the project is to incorporate multiple encryption schemes and mechanisms to provide security and validity for files being stored or transferred.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    An anonymizing peer-to-peer file storage network, similar to Freenet and Gnutella - only better, of course.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    Steghide is a steganography program that is able to hide data in various kinds of image- and audio-files. The color- respectivly sample-frequencies are not changed thus making the embedding resistant against first-order statistical tests.
    Leader badge
    Downloads: 1,041 This Week
    Last Update:
    See Project
  • Jscrambler: Pioneering Client-Side Protection Platform Icon
    Jscrambler: Pioneering Client-Side Protection Platform

    Jscrambler offers an exclusive blend of cutting-edge first-party JavaScript obfuscation and state-of-the-art third-party tag protection.

    Jscrambler is the leader in Client-Side Protection and Compliance. We were the first to merge advanced polymorphic JavaScript obfuscation with fine-grained third-party tag protection in a unified Client-Side Protection and Compliance Platform. Our integrated solution ensures a robust defense against current and emerging client-side cyber threats, data leaks, and IP theft, empowering software development and digital teams to innovate securely. With Jscrambler, businesses adopt a unified, future-proof client-side security policy all while achieving compliance with emerging security standards including PCI DSS v4.0. Trusted by digital leaders worldwide, Jscrambler gives businesses the freedom to innovate securely.
    Learn More
  • 5
    A ultrafast lightweight (no GUI) encryption/decryption software using the CryptoAPI on Windows platform, to secure just about anything - regular files and directories, consoles, communication resources(COM ports), Disk devices, pipes and sockets anythin
    Downloads: 4 This Week
    Last Update:
    See Project
  • 6
    OceanStore is an architecture for a global-scale file system which uses erasure coding, cryptography, and Byzantine agreement to provide available, highly durable storage in a peer-to-peer environment.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    ReHash is an easy-to-use console-based hash calculation tool written in C++. It supports many algorithms and output formats and it can be fully configured using some of the many command-line arguments which can be passed to the tool.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 8
    Full-featured password manager for Windows95/98/2K/XP, with strong encryption. Store passwords for internet accounts, PIN numbers, credit cards. Securely encrypts data with Blowfish or IDEA. Easy navigation, search, import/export, clipboard protection.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    A Java-based client-server architecture for processing network intrusion detection data. The server receives XML alerts from Snort sensors buffers them for review by clients. The console provides a real-time view of IDS activity.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Cloud-Based Software Licensing - Zentitle by Nalpeiron Icon
    Cloud-Based Software Licensing - Zentitle by Nalpeiron

    The #1 Software Licensing Solution. Release new Software License Models fast with no engineering. Increase software sales and drive up revenues.

    1000’s software companies have used Zentitle to launch new software products fast and control their entitlements easily - many going from startup to IPO on our platform. Our software monetization infrastructure allows you to easily build or
    Learn More
  • 10
    QuIDScor is a daemon software integrating Intrusion Detection Systems (IDS) and vulnerability assesment and management platforms. Today QuIDScor correlates and verifies Snort alerts against QualysGuard vulnerability assessment data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    zssh (Zmodem SSH) is a program for interactively transferring files to/from a remote machine while using the secure shell (ssh). It is intended to be a convenient alternative to scp, avoiding the need to re-authenticate each time a file is transferred.
    Leader badge
    Downloads: 5 This Week
    Last Update:
    See Project
  • 12
    Alist is a program that collects hardware and software information about systems and stores it in a database for users to browse and search via a Web interface. The program consists of three parts: a client portion that collects the information, a daemon
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    <b>IVJ MUD (Masive Multiplayer Text Game) is a SSL-based soft:<br>-Client (GUI)<br>-Server (GUI)<br>-Applet (GUI)<br>-Protocol (SSL-based, use of localization files that store strings to reduce trafic and allow for instant i18n.<br> LOOKING FOR HELP!</b
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    ...We provide a set of C libs and utilities to perform cypherpunk style crypto functions, using your existing OpenPGP keys. Ring signatures; credentials; mental poker; timelines; zero knowledge proofs. Cool stuff!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Caesar file-system (Cfs) is a stackable file-system that provides encryption of the data stored on the hard-disk/removable media.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    _malloc is a library able to randomize normal malloc and to make it more secure from possible memory reading; thanks to it, data are allocated in bits with random keys without increasing dimension and access data needed time.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Gobbler: A tool to audit DHCP networks Includes DHCP rogue server detection, DHCP DoS, distributed spoofed port scanner using DHCP to obtain many source IP addresses, mulitple arp scans, filtered port detection, spoofed OS detection (nmap + port 0)
    Downloads: 3 This Week
    Last Update:
    See Project
  • 18
    The FreePKI project aims to create practical, interoperable & free code and services for Certificate and Registration Authorities based on the X.509 standard, including nearly zero-cost ID verification through a PGP-like web of trust scoring system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    C++ template classes for Multi-Value Logic support arbitrary precision and user defined Multi-Value Logic types. This library comes with pre-defined data types: integer, boolean, bit, logic, std_logic, bit_vector, logic_vector and std_logic_vector.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Distributed Syslog collector and viewer system with reliable Syslog msgs over tcp, and query with reg ex. using PERL. Supports IETF syslog and syslog relay, JAVA/JINI based, uses postgreSQL, JBOSS. Chain of custody raw to db data link. UTF8, D, F , UK
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Picky - a selective syslog to mysql database daemon. Allows completely dynamic specific translation of syslog data to dynamic mysql table(s). The other projects under this one are tools that take advantage of the flexibility of Picky and demonstrate it
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    RSA Public Key Crypotgraphy for Web Browsers. Use JavaScript to RSA-encrypt data that can only be decrypted on the server, and not by prying eyes. The poor man's SSL...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Simple Encoder/Decoder, written in the .net framework. It is basicly an encryption program which supports serveral encryption methods. It can encode or decode texts in the forms of files or just plain text written directly in the program.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    IAN (I Am Normal) is used to minimize the chance of an attacker successfully fingerprinting a honeypot. This is accomplished by creating bogus data and history files, alter creation and modification times, add users, patch x number of programs, etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    This is a program that watches your system log files, looking for hack attempts. It instanty reacts to potential security breaches by (for instance) adding firewall rules to cut off the attacker.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB