Search Results for "/storage/emulated/0/android/data/net.sourceforge.uiq3.fx603p/files"

42 projects for "/storage/emulated/0/android/data/net.sourceforge.uiq3.fx603p/files" with 2 filters applied:

  • ServiceDesk Plus, a world-class IT and enterprise service management platform Icon
    ServiceDesk Plus, a world-class IT and enterprise service management platform

    Design, automate, deliver, and manage critical IT and business services

    Best in class online service desk software. Offer your customers world-class services with ServiceDesk Plus Cloud, the easy-to-use SaaS service desk software from ManageEngine, the IT management division of Zoho. Track and manage IT tickets efficiently, resolve issues faster, and ensure end-user satisfaction with the cloud-based IT ticketing system used by over 100,000 IT service desks worldwide. Manage the complete life cycle of IT incidents, problems, changes, and projects with out of the box ITIL workflows. Create support SLAs, define escalation levels, and ensure compliance. Automate ticket dispatch, categorization, classification, and assignment based on predefined business rules, and set up notifications and alerts for timely ticket resolution. Reduce walk ins and unnecessary tickets by giving your users more control. Enable end users to access IT services through your service catalog in the self-service portal. Help users create and track tickets and search for solutions.
    Learn More
  • The Apple Device Management and Security Platform Icon
    The Apple Device Management and Security Platform

    For IT teams at organizations that run on Apple

    Achieve harmony across your Apple device fleet with Kandji's unmatched management and security capabilities.
    Learn More
  • 1
    DAR - Disk ARchive

    DAR - Disk ARchive

    For full, incremental, compressed and encrypted backups or archives

    DAR is a command-line backup and archiving tool that uses selective compression (not compressing already compressed files), strong encryption, may split an archive in different files of given size and provides on-fly hashing, supports differential backup with or without binary delta, ftp and sftp protocols to remote cloud storage Archive internal's catalog, allows very quick restoration even a single file from a huge, eventually sliced, compressed, encrypted archive eventually located on a remote cloud storage, by only reading/fetching the necessary data to perform the operation. ...
    Leader badge
    Downloads: 104 This Week
    Last Update:
    See Project
  • 2
    duply (simple duplicity)
    Duply is a shell front end for the duplicity backup tool https://duplicity.us . It simplifies the usage by implementing backup job profiles, batch commands and more. Secure backup to non-trusted file spaces made easy.
    Leader badge
    Downloads: 52 This Week
    Last Update:
    See Project
  • 3
    GlobalPlatform

    GlobalPlatform

    Implementation of GlobalPlatform smart card specification

    The GlobalPlatform card specification is a standard for the management of the contents on a smart card. Mainly this comprises the installation and the removal of applications. This project offers a C library and a command line shell. Find more information on https://kaoh.github.io/globalplatform/
    Downloads: 23 This Week
    Last Update:
    See Project
  • 4
    Defa Protect HTML5 Video From Download

    Defa Protect HTML5 Video From Download

    Prevent and Protect Your HTML5 Video, Music , Audio From Download Free

    Defa Protector is A Simple PHP and Wordpress Plugin To Protect and Prevent Video Save As From Browser and Some Video Grabber. There is 100% Guaranteed Protection and There might be some tradeoff but If you care about Digital Rights Management of Your Video and Music Content. This Project is for you. Defa Protector 6.7.1 Revamp Code For Better Performance To The Bone. We almost rewritten this project from scratch.
    Downloads: 0 This Week
    Last Update:
    See Project
  • The only CRM built for B2C Icon
    The only CRM built for B2C

    Stop chasing transactions. Klaviyo turns customers into diehard fans—obsessed with your products, devoted to your brand, fueling your growth.

    Klaviyo unifies your customer profiles by capturing every event, and then lets you orchestrate your email marketing, SMS marketing, push notifications, WhatsApp, and RCS campaigns in one place. Klaviyo AI helps you build audiences, write copy, and optimize — so you can always send the right message at the right time, automatically. With real-time attribution and insights, you'll be able to make smarter, faster decisions that drive ROI.
    Learn More
  • 5
    360-FAAR  Firewall Analysis Audit Repair

    360-FAAR Firewall Analysis Audit Repair

    360-FAAR Analyze FW1 Cisco Netscreen Policy Offline Using Config/Logs

    ...Read Policy and Logs for: Checkpoint FW1 (in odumper.csv / logexport format), Netscreen ScreenOS (in get config / syslog format), Cisco ASA (show run / syslog format), 360-FAAR compares firewall policies and uses CIDR and text filters to split rulebases / policies into target sections and identify connectivity for further analysis. 360-FAAR supports, policy to log association, object translation, rulebase reordering and simplification, rule moves and duplicate matching automatically. Allowing you to move rules to where you need them. Build new rulebases from scratch with a single 'any' rule and log files, with the 'res' and 'name' options. Switch into DROPS mode to analyse drop log entries.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    Pixeloid

    Pixeloid

    A novel and uber-secure way to store data, by Ajay Menon

    Pixeloid is a free piece of software that lets users encode data, in the form of text or an image(β), into a Pixeloid Matrix. Pixeloid additionally provides impenetrable security to users by enabling them to password protect their matrices.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    The Encode

    Encode your text files

    This software is intended to encode your text files efficiently. You can decode them later using the same algorithm you used to encode it. Encode is professionalism packed simply and freely. You can use Encode for any non-illegal purposes. You can make any number of copies and redistribute Encode as it is.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    MicroZip

    MicroZip

    Create,extract and encrypt ZIP,GZIP,TAR,BZIP2,TAZ files on Java mobile

    ...MicroZip can create and extract ZIP,TAR,TGZ,TBZ2 archives and extract many other formats as JAR,GZ,BZ2,TBZ,WAR,BZIP2,GZIP,Z,TAZ,CBZ etc. MicroZip allows you to extract selected files without extracting the whole ZIP archive. MicroZip also supports encrypted ZIP archives with both classic ZIP encryption and AES 256 encryption algorithm.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    Hash

    Hash

    Hash: File Checksum Generator

    Hash is fast and simple java utility program for calculating and verifying checksums for files and text. Hash can generate MD5, SHA-1, SHA-256, SHA-384 and SHA-512 checksum values.
    Downloads: 2 This Week
    Last Update:
    See Project
  • TelemetryTV content management and device management Icon
    TelemetryTV content management and device management

    Simple and intuitive digital signage software.

    <section class="row"> <div class="small-12 columns"> <p class="description">TelemetryTV is a powerful digital signage platform built for the modern communicator who needs to engage audiences, generate awareness, or give their community a voice. TelemetryTV allows users to broadcast dynamic content easily by streaming video, images, social feeds, turnkey apps, and data-driven dashboards to all of your displays wherever they are. TelemetryTV powers marketing and internal communications at Starbucks, New York Public Library, Stanford University, and more.</p> </div> </section>
    Learn More
  • 10

    RuSimpleCrypt

    A tool to encrypt files in Russian.

    ...Официальная страница http://xn--90abhbolvbbfgb9aje4m.xn--p1ai/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D1%88%D0%B8%D1%84%D1%80%D0%BE%D0%B2%D0%B0%D0%BD%D0%B8%D0%B5/rusimplecrypt-%D1%88%D0%B8%D1%84%D1%80%D0%BE%D0%B2%D0%B0%D0%BD%D0%B8%D0%B5-%D1%84%D0%B0%D0%B9%D0%BB%D0%BE%D0%B2.html A tool to encrypt files in Russian. Only for the Windows operating system. Integration with Explorer context menu does not. AES encryption of 256 bits. based on sourceforge.net/projects/oss-simplecrypt/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    C.P.D.S Criptografia por Desloc. Simples
    ...Programa leve, rápido e potente.Obs: O arquivo a ser codificado deve estar dentro da mesma pasta onde o programa está salvo. Program that encrypts a text file,(except for Microsoft Office files) based on a 15 character key.PS, the file that will be coded must be salved in the same place where the program is salved at. English version coming soon.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    AES256 Password manager Russian version

    Simple password manager in Russian

    Simple password manager that uses encryption AES 256. Translated into Russian. AES256 Password Manager (originally Encrypter) decoder is a text file that stores the passwords or other sensitive data is completely secure manner using encryption algorithm AES 256-bit. Official page http://xn--90abhbolvbbfgb9aje4m.xn--p1ai/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D0%BF%D0%B0%D1%80%D0%BE%D0%BB%D0%B8/aes256-password-manager-%D0%BF%D1%80%D0%BE%D1%81%D1%82%D0%BE%D0%B9-%D0%BC%D0%B5%D0%BD%D0%B5%D0%B4%D0%B6%D0%B5%D1%80-%D0%BF%D0%B0%D1%80%D0%BE%D0%BB%D0%B5%D0%B9.html Autor twitter: https://twitter.com/mrkaban546
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    USBizmo

    USB Gizmo for Dummies

    USB Gizmo for Dummies USBizmo is capable of restoring hidden files and directories from any USB devices.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    The Sleuth Kit is a C++ library and collection of open source file system forensics tools that allow you to, among other things, view allocated and deleted data from NTFS, FAT, FFS, EXT2, Ext3, HFS+, and ISO9660 images.
    Downloads: 27 This Week
    Last Update:
    See Project
  • 15
    Cygnus Editor

    Cygnus Editor

    Java text editor with AES file encryption.

    ...AES-256 uses many applications, websites and networks to secure their data. And now you can secure your document with Cygnus Editor.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 16

    groestl256sum/groestl512sum

    An utility that calculates and verifies Grøstl hashes of files

    This project is superseded by 'file digest' utility which can calculate Grøstl hashes plus more. Get it here: https://sourceforge.net/projects/filedigest/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    USBRescueX

    USBRescueX

    Rescue and clean your hard disk or USB memory, delete broken shortcuts

    USBRescuex in its version 2.1 is a computer program category in utility software for files and folders, which its main function is the recovery of hidden files, read-only and corrupted our device (either USB memory devices, removable storage or hard disk). Besides recover those important files for you , eliminates the famous RECYCLER virus , which is the basis of other USB flash drives for viruses , this virus is the main wrongdoer in your USB/Storage Device/Device Storage space Removable memory/disk hard, as the virus will hide all your files and folders , creating false shortcuts and reproducing more viruses to your computer and other USB/removable Devices/Hard Drives storage. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 18
    Cyberoam iView - Open Source SIEM
    Cyberoam iView; the Intelligent Logging & Reporting solution provides organizations network visibility across multiple devices to achieve higher levels of security, data confidentiality while meeting the requirements of regulatory compliance. To know more about Cyberoam and it’s security solutions visit us at www.cyberoam.com.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 19
    Mystery

    Mystery

    software cryptographic data protection

    Software tool for cryptographic protection of data is used to encrypt and decrypt files. Signature and check for dokumemntov and text files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Wordpie Python Based Brute Force

    Wordpie Python Based Brute Force

    Python Based Brute Force Password Cracking Assistant By Clownsec

    A python script used to generate all possible password combinations for cracking WAP and other logins or password files. This program is open source. If you see the need to repair or change something by all means do so, but share your findings. *HONK* Usage: wordpie.py [-h] [-o OUTPUT] [-min MIN_SIZE] [-max MAX_SIZE] [-N] [-L] [-U] [-S] [-A] [-v] Generate a wordlist with all possible combinations of letters including: -L (Lowercase Letters) -U (Uppercase Letters) -N (Numbers) -S (Special Characters) -A (All Characters, Numbers, and Letters) -min (Minimum Size) -max (Maximum Size) -o outputfile.gz or -o stdout By default -o filename.gz to create a GZ compressed text file of all the words. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    File Scrambler

    Scramble your files

    Scrambler splits your files into a disired number of chunks and puts them together in a different order. This makes the file unreadable. In order to read them again you must unscramble them. Possible Uses: 1. Protect your private files (e.g. pictures, text, source file etc.) 2. Protect your hosted file on your website. (e.g. You can scramble the file and upload it.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22
    NEO Folder Lock

    NEO Folder Lock

    Lock your files and folders .

    Simply lock and unlock your files and folders.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 23
    Bigram Table Generator

    Bigram Table Generator

    A program to generate random reciprocal bigram tables

    A command-line program to encrypt/decrypt a message using a random reciprocal bigram table and write a bigram table to a text file. Executing the program without any command-line arguments starts bigram in message encryption/decryption mode. The program prompts for a password or passphrase and a message to encrypt/ decrypt. After the message is entered the ciphertext is displayed. Executing the program with command-line arguments causes bigram to generate a random bigram table to...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    DITRAEXTO

    DITRAEXTO

    Directory traversal exploitation tool for web developers.

    Ditraexto es un proyecto creado con la finalidad de facilitar la explotación de sitios con la falla de Directory Path Traversal. La cual es una falla un tanto difícil de detectar pero que sin embargo cuando es detectado representa un peligro para el sitio o servidor afectado. Esta falla de seguridad tiene muchísimas variantes desde niveles fáciles en su detección hasta fallas en el seteo de cookies o sesiones. La finalidad en todo caso de DITRAEXTO es la automatización de la obtención/...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    Free-SA

    Free-SA is report generating tool for web, proxy and mail log files

    Free-SA is logs processor and report generating tool. It can be used to control traffic usage, to evaluate conformance to the Internet access security policies, to investigate security incidents, to evaluate web server efficiency and to detect troubles with server configuration.
    Downloads: 4 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB