Enterprise manufacturers and distributors requiring a solution to manage and execute complex processes
Efficiently executing the complex processes of enterprise manufacturers and distributors. Infor M3 is a cloud-based, manufacturing and distribution ERP system that leverages the latest technologies to provide an exceptional user experience and powerful analytics in a multicompany, multicountry, and multisite platform. Infor M3 and related CloudSuite™ industry solutions include industry-leading functionality for the chemical, distribution, equipment, fashion, food and beverage, and industrial manufacturing industries. Staying ahead of the competition means staying agile. Our new capabilities bring improved data-driven insights and streamlined workflows to help you make informed decisions and take quick action.
Learn More
Professional Email Hosting for Small Business | Greatmail
Ready to switch to a more reliable and secure email hosting solution?
Dependable cloud based email hosting with spam filtering, antivirus protection, generous storage and webmail. Compatible with Outlook and all other POP3/IMAP clients. High volume SMTP service for responsible senders. Outbound relay service for transactional messages, email marketing campaigns, newsletters and other applications. Dedicated email servers, clustering and multiple IP load balancing for high volume senders. Fixed monthly cost with unlimited sending and reputation monitoring. Greatmail is an email service provider (ESP) specializing in business class email hosting, SMTP hosting and email servers. For ISPs, application programmers and cloud developers, we also provide custom solutions including dedicated IP servers and process specific, load balanced configurations with multiple servers.
The aim of the UndertheCarpet project is to develop a general steganalytic tool that is able to proccess different stego mediums (multiple image formats such as gif, bmp, jpg, etc. but also sound and text files), incluiding many of the state-of-the-art te
Open En/decryption software. Current version allows for 2 keys, 1 at 32 bytes, and 1 at 20 bytes. Supports ASCII and Binary files in a multiple-executable polylithic architecture.
Chaosreader is a freeware tool to fetch application data from snoop or tcpdump logs. Supported protocols include TCP, UDP, IPv4, IPv6, ICMP, telnet, FTP, HTTP, SMTP, IRC, X11, VNC, ...
Engage your employees and agents more efficiently with ScreenMeet as a seamless extension of your existing IT Service Delivery Platform.
ScreenMeet’s unique combination of video calling, screen share, and remote desktop functionality lets you quickly diagnose hardware and software issues with no frustration.
TrustedPickle is a Python module which lets you create and sign your datafiles. By using public/private key techniques, this module protects your users from loading malicious datafiles that others might claim you created. LEGAL FOR EXPORT.
Steghide is a steganography program that is able to hide data in various kinds
of image- and audio-files. The color- respectivly sample-frequencies are not
changed thus making the embedding resistant against first-order statistical
tests.
ReHash is an easy-to-use console-based hash calculation tool written in C++. It supports many algorithms and output formats and it can be fully configured using some of the many command-line arguments which can be passed to the tool.
For SaaS builders, software companies, ISVs and ISOs who want to embed payments into their tech stack
NMI Payments is an embedded payments solution that lets SaaS platforms, Software companies and ISVs integrate, brand, and manage payment acceptance directly within their software—without becoming a PayFac or building complex infrastructure. As a full-stack processor, acquirer, and technology partner, NMI handles onboarding, compliance, and risk so you can stay focused on growth. The modular, white-label platform supports omnichannel payments, from online, mobile and in-app to in-store and unattended. Choose from full-code, low-code, or no-code integration paths and launch in weeks, not months. Built-in risk tools, flexible monetization, and customizable branding help you scale faster while keeping full control of your experience. With NMI’s developer-first tools, sandbox testing, and modern APIs, you can embed payments quickly and confidently.
A Java-based client-server architecture for processing network intrusion detection data. The server receives XML alerts from Snort sensors buffers them for review by clients. The console provides a real-time view of IDS activity.
<b>IVJ MUD (Masive Multiplayer Text Game) is a SSL-based soft:<br>-Client (GUI)<br>-Server (GUI)<br>-Applet (GUI)<br>-Protocol (SSL-based, use of localization files that store strings to reduce trafic and allow for instant i18n.<br>
LOOKING FOR HELP!</b
The FreePKI project aims to create practical, interoperable & free code and services for Certificate and Registration Authorities based on the X.509 standard, including nearly zero-cost ID verification through a PGP-like web of trust scoring system.
RSA Public Key Crypotgraphy for Web Browsers.
Use JavaScript to RSA-encrypt data that can only be decrypted on the server, and not by prying eyes.
The poor man's SSL...
Visual IP is a network protocol
analyzer that works in any operating system with a java VM. At the
moment it only allows you to examine data from the disk, and created
by tcpdump. You can interactively browse the capture data, viewing
summary and det
Tattoo will provide a set of command-line scripts for analyzing raw tcpdump files or ASCII hexadecimal representations of network traffic to identify format, function, and communication model.
CryptoPy is a pure python implmentation of cryptographic algorithms and applications. The algorithms are developed for readability more than speed. The collection now includes IEEE 802.11i specific algorithms that generated the test vectors for 802.11i.
An Experimental Platform for Secure Peer Services, QARE uses a decentralized trust model, a Public Key Infrastructure and provides single logon for multiple applications running across multiple systems. WAR files are used to add applications.
A password manager that is able to encript data in various algorithms and store them in file, database, ...
It is written in 100% pure Java using only Java technology.
The end goal of the FreeMess Project is to produce a cryptographically secure, pseudonymous, cross-platform peer-to-peer Instant Messenger service, piggybacking on FreeNet (http://freenet.sourceforge.net) as a distributed filesystem to hold user data.
Trace2ip is to hold one trace of all connections IP, memory the information into the file. The file to have like unique key ip_source and like associate data header IP. Alternative Key:Audit, Trace, Monitor, Dump, IP.
Free Crypto Token will be a free, operating system independent and standard driven interface to smartcards, key files and other hard- and software crypto tokens. In fact FCT will be a framework for PKCS#11 modules that will also include some implementati
The RAZip bitstream format was designed to provide a faster
random access to compressed data than what is currently
possible using the GZIP format. During the desing phase,
some other features were added, like encryption and error correction.
We at GCD are here to bring you ease in decoding your friends CRYPTIC GeekCode .signature files -=). Also sometime in the future we plan to eventualy start an ENCODER to help you even more!