Search Results for "sandbox:/mnt/data/project_plan.pod" - Page 2

Showing 79 open source projects for "sandbox:/mnt/data/project_plan.pod"

View related business solutions
  • Cloud data warehouse to power your data-driven innovation Icon
    Cloud data warehouse to power your data-driven innovation

    BigQuery is a serverless and cost-effective enterprise data warehouse that works across clouds and scales with your data.

    BigQuery Studio provides a single, unified interface for all data practitioners of various coding skills to simplify analytics workflows from data ingestion and preparation to data exploration and visualization to ML model creation and use. It also allows you to use simple SQL to access Vertex AI foundational models directly inside BigQuery for text processing tasks, such as sentiment analysis, entity extraction, and many more without having to deal with specialized models.
    Try for free
  • ERP Software To Simplify Your Manufacturing Icon
    ERP Software To Simplify Your Manufacturing

    From quote to cash and with AI in mind, our ERP software will become the most valuable asset at your company.

    Global Shop Solutions AI-integrated ERP software provides the applications needed to deliver a quality part on time, every time from quote to cash and everything in between, including shop management, scheduling, inventory, accounting, quality control, CRM and 25 more.
    Learn More
  • 1
    Eluvium Data Encryption Software

    Eluvium Data Encryption Software

    DATA PROTECTION SOLUTION FOR A SAFER WORLD

    Eluvium is an easy to use encryption software that uses 256-bit military grade encryption to protect your private files and prevent them from being modified, read or even theft. Protect all your sensitive personal and commercial information including your photos, credit card data, tax returns or any other private document. Eluvium, don't require an internet connection. We take our privacy policy very seriously, so we never have any knowledge of your password and no way to retrieve or reset it, even in emergencies. It's one of the ways in which we ensure that our users' data is always completely secure... even from ourselves.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Hyenae.Net

    Hyenae.Net

    Advanced Data Generator

    Hyenae.Net is an advanced data generator and the successor of Hyenae. Hyenae.Net allows you to set up and dispatch custom data streams and can be used to simulate almost any network or data protocol including checksums and data field randomizaion.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    [C#] Secure Shredder Console

    A console file shredder that supports many algorithms.

    There are many ways to delete a file, whether you want it to be secure or not, fast or not. Since nowadays, we use computers to store data (including confidential ones), we want to totally delete a file with no traces for any file recovery solution. The program supports Zero Data 1 Pass, British HMG IS5-Baseline 1 Pass, Russian GOST P50739-95 2 Passes, British HMG IS5-Enhanced 3 Passes, US DoD 5220.22-M / Canadian RCMP DSX 3 Passes, German VSITR 7 Passes, Bruce Schneier's 7 Passes, Canadian RCMP TSSIT OPS-II 7 Passes, and Peter Gutmann 35 Passes. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    LockyMonitor

    Windows Service to check if files has been changed by ransomware

    Windwos Service to check if files has been changed by crypto ransomware. It does not prevent from ransomware infection! Don't use it in productive environments to prevent data loss! The Software comes without any warranty. If files has been changed it send a email and shutdown or disconnect the host or stop the server (LanmanServer) service to disconnect all shares on the server. The FileSystemWatcher object raises the events for the files in the monitored target folder. If a file in the monitor folder is changed by a user or programm a false alarm will be raised! ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Fully managed relational database service for MySQL, PostgreSQL, and SQL Server Icon
    Fully managed relational database service for MySQL, PostgreSQL, and SQL Server

    Focus on your application, and leave the database to us

    Cloud SQL manages your databases so you don't have to, so your business can run without disruption. It automates all your backups, replication, patches, encryption, and storage capacity increases to give your applications the reliability, scalability, and security they need.
    Try for free
  • 5

    LockyService

    Windows Service to monitor file events for crypto ransomware

    Windows Service to monitor drive c: for file events with crypto specific file extensions or with big file entropy. It does not prevent from ransomware infection! Don't use it in productive environments to prevent data loss! The Software comes without any warranty. When a alarm is triggerd it send a email and shutdown the host or disable the network interfaces. The alarm can be triggerd if locky extensions were found. Or if files were probably encrypted (big file entropy level). Or if a file event counter exceeds the allowed number of events in a certain periode of Time. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    LockyMonitorConsole

    Console app to check if files has been changed by crypto ransomware

    Console application to check if files has been changed by crypto ransomware like Locky. It does not prevent from ransomware infection! Don't use it in productive environments to prevent data loss! The Software comes without any warranty. If files has been changed it send a email and shutdown or disable the network interfaces of the host. It runs under the user account and monitor drives which are connected to a server share. Works with remote to local Symlinks on a server share. Can map and monitor drives by using the subst or net use command. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    A library for reading and removing DRM schemes from eBooks. The one and only purpose of said library is providing the ability to access the content of legally obtained eBook under conditions of DRM management server failure.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    TCP-IP Proxy with ISO8583 Decoder

    TCP-IP man-in-the-middle proxy

    TCP-IP man-in-the-middle proxy with ISO8583 decoder. Users specify the port to receive the message and the address and port of the destination message. The message has 2 byte header length followed by data. It is possible to change the message from the listening side to the sender side on the fly and vice versa. Cryptography enables to adjust message hash on the fly to accommodate changes made on the injected messages.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    White Knight

    White Knight

    Machine Shutdown Security Tool

    ...This project seeks to provide a quick any easy low overhead solution that will shut your computer down to trigger your full disk encryption before an unsophisticated adversary has time to extract sensitive data. News: Alpha 0.04 Hotfix Update - Passwords now work! - Successfully tested against USB Rubber Ducky! This release I worked on building out a class that can be used to start offensive attacks on the target USB. Two options have been enabled for this release, the ability gather a log of all files on the incoming device & the ability to calculate the SHA1 of the incoming drive's files. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Turn speech into text using Google AI Icon
    Turn speech into text using Google AI

    Accurately convert voice to text in over 125 languages and variants by applying powerful machine learning models with an easy-to-use API.

    New customers get $300 in free credits to spend on Speech-to-Text. All customers get 60 minutes for transcribing and analyzing audio free per month, not charged against your credits.
    Try for free
  • 10

    zcahttpproxy

    TV proxy with cas descrambler.

    Multicast UDP to HTTP proxy with Interzet CAS Descrambler. 10.10.2019 New epg map file: http://github.com/ViPetroFF/zcahttpproxy/blob/master/TVGMapNames.ini EPG resource: http://www.teleguide.info/ To update epg map run: "setupM3U.cmd". Obsolete support page: http://code.google.com/p/zcahttpproxy/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    SaBackup

    SaBackup

    Create incremental backups

    SaBackup creates incremental backups of your data. For this it utilizes Microsoft's Robocopy and the Volume Shadow Copy Service. You can use any file browser to access your backups, no special program is needed.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    X-Crypt
    X-Crypt is a user friendly data encryption application. It allows you to encrypt sensitive data like credit card information into an unreadable format, this is done using a password, the more complicated the better. X-Crypt can encrypt whole files or just some text. The encryption algorithm is very complex and has guaranteed security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    fzRec

    FileZilla Password Recovery Tool

    Recover stored FileZilla passwords. Source: https://github.com/uberalles/fzRec
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    Simple ICMP Tunnel

    A simple Windows ICMP exfiltration client

    Windows client runs without administrative rights. Just provide a server IP and start typing to send your payload through an ICMP ping packet. On the other side, you can simply run a tcpdump to extract the data you send from the client. Useful for situations where you have a firewall that allows only ICMP and a Windows box without admin credentials.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    IIS7 Geoblock Module
    ...It uses the IPv4 address to determine the geographic location of the request by using maxminds geo IP file and takes action accordingly. Next to the module, 2 tools are included. 1 to quickly lookup the country for a specific IP address and 1 to help you automate the update of the MaxMind data file. An extensive manual is available to install and use the module.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    AlertWheel

    AlertWheel is a visualization-based analysis tool for Snort IDS logs

    AlertWheel is a new software application easing network analysis on large-scale networks. It is based on a novel radial visualization capable of simultaneously displaying several thousand alerts, emphasizing the most important alerts or patterns in the dataset. Among other things, AlertWheel offers a new technique for representing bipartite graphs (where links exist between two distinct node groups). Using this approach, links are positioned in a way to reduce occlusion in the visualization....
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Online Signature Verification

    Online Signature Verification

    Real time signature verification using MATLAB and C#

    ...An individual can sign on the digitizing tablet using the special pen regardless of his signature size and position. The signature is characterized as pen-strokes consisting x-y coordinates and pressure with the data being stored in a signature database. Dynamic time warping (DTW) and quadratic discriminant analysis (QDA) is used to get results where the system accepts 2% of forged signatures and rejects 5% of true signatures
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Key Logger MAX

    Key Logger MAX

    Usefull keylogger to keep track of your kids ect.

    This keylogger will provide you with access to keystokes, as well as screenshots of your user. This product emails the keystrokes in a readable format with logging data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    KeePass KdbpFile format

    A plugin to allow Import and Export in Fast KDBP format

    *** NOTE: Not compatible with KeePass 2.35 or greater *** This is a plugin to KeePass <http://www.KeePass.info> to allow import and export of a new file format called KDBP. This contains 100% of the data in a standard kdbx file, and is encrypted using exactly the same compression, cryptography and integrity code. The difference is that inside the encrypted container, rather than XML, is a binary format serialized using Protocol Buffers. This has the advantage of being smaller and faster than XML, and is therefore particularly suitable for use with mobile versions of KeePass, such as Keepass2Android <http://keepass2android.codeplex.com/>. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Steganography v2.0

    Steganography v2.0

    Hide archives inside any image type

    .... ************************************************************************************************************************** Now has the ability to mask the size of the image so that it stays the same even when TB's of data are hidden within it. ************************************************************************************************************************** --- UPDATES --- * Now has support for all image types. * Now has support to mask an images file size in outer type mode. * v1.0 bug fixes. --- ALERT --- Once an image is edited in any image software it looses its hidden files and reverts back to being a regular image file again!
    Leader badge
    Downloads: 21 This Week
    Last Update:
    See Project
  • 21
    Arcanum Editor
    The Arcanum Editor is a small but powerful tool to encrypt and decrypt messages. The program also comes with it's own format CTXT. This format is based on XML and allows you to save texts with the Advanced Encryption Standard.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 22

    ELock

    Prevent unauthorised access to operating system

    The ELock program allows administrator to block access to operating system on Windows CE5.0, CE6.0 devices. It allows to control running programs. The functionality is similar to AppCenter (which works only on Motorola devices). Works on Motorola, Casio, Datalogic and others devices. Program ELock pozwala administratorowi zablokować dostęp użytkownika do opcji systemu na urządzeniach z systemem Windows CE5.0, CE6.0. Umożliwia kontrolę uruchamianych programów. Jest programem podobnym do...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 23
    File Wiper .NET

    File Wiper .NET

    Tool written in C# to safely delete existing files.

    File Wiper .NET is a program intended to safely destroy the content of files. This destructive job is done by overwriting the content of a given file before deleting it. To overwrite the file content a user can choose one of the predefined wiping algorithms. Further, after wiping the file content the name of a file is also overwritten using a special wiping algorithm.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 24
    WPF Code Generator

    WPF Code Generator

    Word List Generator for Windows

    This a .net 4.5 WPF application that generates word lists, similar to crunch for linux. Just one nifty multi-threaded dictionary / code / word - list generator. It is a permutation combination engine, so it is perfect for brute force activities. Please show your appreciation and leave a review or comment, so I can find the motivation to improve it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Encryptron

    Encryptron

    An encryption software using C# 4.0

    ...Now feed this data back in the software you get usual form the plain English language. Put the same software at both terminals it may help in encoding and deciphering simultaneously
    Downloads: 1 This Week
    Last Update:
    See Project