Search Results for "/storage/emulated/0/android/data/net.sourceforge.uiq3.fx603p/files"

Showing 9 open source projects for "/storage/emulated/0/android/data/net.sourceforge.uiq3.fx603p/files"

View related business solutions
  • The full-stack observability platform that protects your dataLayer, tags and conversion data Icon
    The full-stack observability platform that protects your dataLayer, tags and conversion data

    Stop losing revenue to bad data today. and protect your marketing data with Code-Cube.io.

    Code-Cube.io detects issues instantly, alerts you in real time and helps you resolve them fast. No manual QA. No unreliable data. Just data you can trust and act on.
    Learn More
  • The AI-powered unified PSA-RMM platform for modern MSPs. Icon
    The AI-powered unified PSA-RMM platform for modern MSPs.

    Trusted PSA-RMM partner of MSPs worldwide

    SuperOps.ai is the only PSA-RMM platform powered by intelligent automation and thoughtfully crafted for the new-age MSP. The platform also helps MSPs manage their projects, clients, and IT documents from a single place.
    Learn More
  • 1

    ProxyCryptGUI

    An easy to use 'front-end' to ProxyCrypt 3.X encryption application

    ProxyCryptGUI2025 • ProxyCryptGUI2025 is a free application that provides a Windows GUI (graphical user interface) for ProxyCrypt to manage encrypted virtual disk drives. • The setup file for ProxyCryptGUI2025 includes the required setup of ProxyCrypt 3.x and required AIM disk driver. • All files stored in an encrypted virtual drive can be accessed just as any files on regular disk drives but only after the drive is mounted/opened with the associated passphrase. • ProxyCryptGUI2025 can open and convert most (but not all) older ProxyCrypt 2.x encrypted containers. • ProxyCryptGUI2025 is currently a beta version release... be sure to keep data backed up Requirements: • Windows 7, 8 or 8.1, 10, 11 64b • computer administrator privileges • CPU with SSE2 instructions
    Downloads: 5 This Week
    Last Update:
    See Project
  • 2
    Seed Tag

    Seed Tag

    Hide your SEED phrase in a fake SEED phrase

    ...I made this for myself, when i wanted to make the cheapiest iron crypto wallet from a dog tag. This program is a simple way to protect my seed phrase if others see my dog tag howto: 0 unplug internet connection!!! and use temporary os system 1 paste seed phrase as string into memo 2 enter three keys 3 pack it 4 copy packed seed as string 5 paste packed seed into memo 6 unpack it 7 compare unpacked seed wtih original seed 8 profit
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    Easy Keytrans

    Easy Keytrans

    Assign strings/functions to function keys and Password Management

    Simple tool to assign strings or functions to function keys and password manager
    Downloads: 3 This Week
    Last Update:
    See Project
  • 4

    HashOR

    HashOR is used to create 84 hashes of a string or file.

    HashOR can create 84 hashes from data or file input. It also can create a TTH and AICH.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Securden Privileged Account Manager Icon
    Securden Privileged Account Manager

    Unified Privileged Access Management

    Discover and manage administrator, service, and web app passwords, keys, and identities. Automate management with approval workflows. Centrally control, audit, monitor, and record all access to critical IT assets.
    Learn More
  • 5
    LazLock

    LazLock

    Free, cross platform, portable password manager.

    The latest version of LazLock is at https://github.com/cyberfilth/LazLock/releases A free, lightweight, portable password manager for Windows & GNU/Linux that encrypts your data with 128 bit AES encryption. LazLock also includes a password generator which allows you to create more secure passwords. A plain text version of your data is never written to disk as all decryption is done in memory. LazLock is truly portable, no installation is required so it can be run from a USB drive. Unlike similar programs, there are no dependencies on the .NET Framework (Windows) or Mono (Linux) ------------------------------------- Easily Copy and Paste your login details into any website without having to manually type them out. ...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 6
    Rose Crypt provides users with a simplistic application that can be used for encrypting files in your computer using a custom passphrase. With its minimal design, Rose Crypt can be used by both advanced and beginner users. Once the encryption process is finished, you can access the newly created file from the location you previously selected.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    Passwort Kalkulator

    Erzeugt/Berechnet Passworte mit hilfe von Pseudozufallszahlen

    Version 1.1.1 Nur noch ein kompliziertes Passwort merken und damit für alle Dienste und Anwendungen über Pseudozufallszahlen viele unterschiedliche, sichere Passworte (repoduzierbar) erzeugen. Die Namen der Dienste können in einer Liste (im Klartext) mit einigen Optionen hinterlegt werden und nach diesen Angaben wird bei jedem Programmlauf das entsprechende Passwort erzeugt. Das Programm ist ohne Installation lauffähig. Auf dem Rechner wird kein Passwort gespeichert! Only remember one...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    WipeOut - Secure Data Erase and Privacy
    WipeOut is secure data deletion method & application. WipeOut method is designed to be fast and secure. WipeOut also has many sub schemes for faster (but not weak) wipe process .
    Downloads: 3 This Week
    Last Update:
    See Project
  • 9
    Finds Text in Delphi *.Pas files e.g. : button1.caption:='Hello' Replaces Text with a function call button1.caption:=TXT(0) {##Hello##} Generates a function „TXT“ with a String List with all found Texts at the beginning of your source.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Network Management Software and Tools for Businesses and Organizations | Auvik Networks Icon
    Network Management Software and Tools for Businesses and Organizations | Auvik Networks

    Mapping, inventory, config backup, and more.

    Reduce IT headaches and save time with a proven solution for automated network discovery, documentation, and performance monitoring. Choose Auvik because you'll see value in minutes, and stay with us to improve your IT for years to come.
    Learn More
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB