Search Results for "c:\program files\micronetics\msmws\program\" - Page 2

104 projects for "c:\program files\micronetics\msmws\program\" with 2 filters applied:

  • Dynamic Work and Complex Project Management Platform | Quickbase Icon
    Dynamic Work and Complex Project Management Platform | Quickbase

    Quickbase is the leading application platform for dynamic work.

    Our no-code platform lets you easily create, connect, and customize enterprise applications that fix visibility and workflow gaps without replacing a single system.
    Learn More
  • Information Security Made Simple and Affordable | Carbide Icon
    Information Security Made Simple and Affordable | Carbide

    For companies requiring a solution to scale their business without incurring security debt

    Get expert guidance and smart tools to launch or level up your security and compliance efforts without the complexity.
    Learn More
  • 1

    innocence-java

    Replace text with POS equivalent text, in a reversible fashion.

    Program takes (currently) english text sentences, and replaces each word in a given sentence with another word having the same Part of Speach (POS) tag. This creates a new sentence containing none of the original words. This new sentence can then be transmitted to a remote user, and using the same software, "de-crypted" into yielding the original sentence.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Azrar

    Azrar

    Encryption addressing long-term data secrecy

    Most of today's cryptographic standards will be broken with tomorrow's computational power. Azrar is a user-friendly tool for the encryption/decryption of single files - preferably compressed archives - addressing long-term data secrecy. Thus, Azrar provides the possibility to use webspace for secure data transfer between two communication/transfer partners (encryption only, network transfer not yet included in current version). Data in encrypted files are secret/private indefinitely. To...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    PBM stealth

    Data hiding in bi-level pbm images

    ...The project also has a PBM viewer in java and ascii viewer which shows the pbm images in ascii format.This project uses binary coded pbm images. Research paper : http://arxiv.org/abs/1304.1683 Key mechanism is not functional and program have bugs which are to be fixed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    Reactor Breeder

    A Genetic Algorithm for Reactors in StarMade

    ...One of the more unique aspects of the game is that ship power management is not as simple as filling a cube with power generation blocks. This mechanism leads to difficulties in getting maximal power generation out of such reactors. This program rectifies this issue by using a self-organizing variant of brute force search. Much of the search space is pruned early on by a user-selectable fitness function. Within a few epochs, reactor output quickly converges to several sub-optimal, yet high-output reactors. Given enough time, the idea is that the optimal reactor configuration will be yielded.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Powerful Website Security | Continuous Web Threat Platform Icon
    Powerful Website Security | Continuous Web Threat Platform

    Continuously detect, prioritize, and validate web threats to quickly mitigate security, privacy, and compliance risks.

    Reflectiz is a comprehensive web exposure management platform that helps organizations proactively identify, monitor, and mitigate security, privacy, and compliance risks across their online environments. Designed to address the growing complexity of modern websites, Reflectiz provides full visibility and control over first, third, and even fourth-party components, such as scripts, trackers, and open-source libraries that often evade traditional security tools.
    Learn More
  • 5
    Maroniecoder

    Maroniecoder

    Encrypt a text through a list of encryption methods

    I came to the conclusion that this program is not worth the time for further development. Use different Encryption methods with parameters to en- or decrypted a text through the list With downloadable source-code since 1.3 You need to have Java installed http://www.oracle.com/technetwork/java/javase/downloads/index.html
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    LastBit Suite

    LastBit Suite

    A steganographic program to hide files into images

    This is a steganogric program that uses images last bits to hide information ( files ). It can crypt data with a rotation and a xor key.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    vigenere.py

    vigenere.py

    this simple program implements the Vigenere cipher in python

    For details of this cipher see; http://en.wikipedia.org/wiki/Vigenere_cipher This cipher can be broken by frequency analysis, this is a toy project, and should not be used in situations where security is important.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    macls

    Perl ls-like command shows mtime, atime, ctime for Linux

    Pure Perl script that has the sole purpose of grabbing the atime, mtime, and ctime of a file or a bunch of files and outputting the results. M-A-C ls (macls)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    SecQua

    SecQua

    SecQua tries to quantify the security of a given Information System

    SecQua is an open source project written in Python, that tries to quantify the security of a given Information System, using a novel security metric, trying to provide a deterministic, unbiased, objective and efficient measurement. The approach is vulnerability driven and in order to get as much unbiased results, it makes use of the National Vulnerability Database. This work is mainly based on the following publications: *C. Patsakis, Gregory Chondrocoukis, D. Mermigas, S. Pirounias, The...
    Downloads: 0 This Week
    Last Update:
    See Project
  • The all-in-one Omnichannel Experience Management Platform Icon
    The all-in-one Omnichannel Experience Management Platform

    Do more than just Surveys.

    Build conversational surveys of any type, for any purpose, in any language. Get 40% more responses.
    Learn More
  • 10
    tcpview (aka wirefox)
    Common network dump analyzer tool to extract application data and pretty show. It reassembles and shows HTTP/SMTP/POP3/IMAP etc files. Please donate if you want this to be a candy.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 11
    The 'jpwgen' program is a Java-based password generator whose functionality resembles the popular 'pwgen' program. The *nix based version of 'pwgen' is available at http://sourceforge.net/projects/pwgen/.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    CAILogin (Counter AI Login) is an image-based user verification program for web-page logins. It's written in plain C with no special dependencies, and hence it's very suitable for embedded systems which lack "big" interpreted languages, such as PHP.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    lanupdate is a application to hold a hole LAN up-to-date. lanupdate get from the server all update-infos and syncronize this with local update-infos(wich program with which version is installed).Shows a window with requiered updates.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    pproxyd

    Passive Proxy Daemon sniffs packets and creates squid proxy logs

    Passive Proxy Daemon (pproxyd) has moved to GitHub (https://github.com/rondilley/pproxyd ) This tool reads pcap format files or reads packets directly from the network, assembles web based traffic and generates squid proxy style logs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Store several passwords with a single portable program. Just remember only one password. It's up to you to decide how many password you want to store, and which name you want to give to that password.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    TinyCrypt is a simple secure program for encrypting files. The core encryption code is only 76 lines of C code, based on the well known ARC4-D(768) algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Anti net-cut program, programme Anti net-cut, anti netcut, ,netcut , Arcai
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    A small program that allows the user to delete files in a secure manner.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    pngacidbath is the one true PNG image brute force compressor. While other tools simply run down a list of "intelligent" compressor algorithms (some known as zlib methods), pngacidbath tries every byte combination to come up with THE smallest file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Network Keylogger
    Network Keylogger is a program that sends every key pressed in a computer to another computer, via TCP/IP.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    This project provides a java implementation of the Captcha project ( see http://www.captcha.net ). A CAPTCHA is a program that can generate and grade tests that: -Most humans can pass. -Current computer programs can't pass.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Library to encode and decode text or files to base64.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    A simple console program to battle fake naming and name flooding in p2p networks. Connects to a DirectConnect hub (adc and nmdc protocols supported) and scans it for known fake patterns. Also can parse hash indexes of StrongDC and FlylinkDC clients.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    RABBIT Vulnerability Scanner
    RABBIT is a black-box vulnerability scanner framework. Designed to make it easy to program your own plugins in order to satisfy your scanning needs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    PassKey
    Universal password generator. This program generates password for each account you want from hostname, username and one global password (passkey, master password, skeleton key). So you need to remember only one password.
    Downloads: 3 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB