Search Results for "c:\program files\micronetics\msmws\program\" - Page 18

Showing 546 open source projects for "c:\program files\micronetics\msmws\program\"

View related business solutions
  • Get full visibility and control over your tasks and projects with Wrike. Icon
    Get full visibility and control over your tasks and projects with Wrike.

    A cloud-based collaboration, work management, and project management software

    Wrike offers world-class features that empower cross-functional, distributed, or growing teams take their projects from the initial request stage all the way to tracking work progress and reporting results.
    Learn More
  • Turn speech into text using Google AI Icon
    Turn speech into text using Google AI

    Accurately convert voice to text in over 125 languages and variants by applying powerful machine learning models with an easy-to-use API.

    New customers get $300 in free credits to spend on Speech-to-Text. All customers get 60 minutes for transcribing and analyzing audio free per month, not charged against your credits.
    Try for free
  • 1
    aircrack-ng is a set of tools for auditing wireless networks. It's an enhanced/reborn version of aircrack. It consists of airodump, aireplay, aircrack, airdecap, and some tools to handle capture files (merge, convert, etc.).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Pqmf is an open source project which inted to create a strong alternative to PGP. Using Pqmf you will be able to to safeguard your private files under 160bits long Keys in the simplest way posible, just choose a file set a password and voila!.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    TextCode 1.4 is a small security program for encrypting/decrypting of text files (.txt, .rtf, .html etc.). You can encrypt any text files using a password. Latest Edition: TextCode 1.4 (compatible with files encrypted by TC 1.3, infos in the program!)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Multispoof exploits weak authentication method based on IP-MAC pairs checking, implemented frequently in Ethernet networks by ISPs. This program allows to multiply user's throughput and serves as a demonstration of spoofing effectiveness.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Resco toolkit for building mobile apps Icon
    Resco toolkit for building mobile apps

    A no-code toolkit for building responsive and resilient mobile business applications for Microsoft Power Platform, Dynamics 365, Dataverse and Salesfo

    Deploying mobile apps with Resco takes days, not months—all without writing a single line of code. Workers can download the Resco app from AppStore, Google Play, or Windows Store, log into your company environment, and instantly use the app you have published on any device.
    Learn More
  • 5
    Screenalert, are notifications windows styled, every user/program can send an alert on your display. Alerts can be permanent or disappear after x seconds. Several themes are available for toaster popup. It is entirely gtk based and is licensed under the
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    Gate Guardian is a library of C/C++ functions that can be used to avoid common security problems when a process forks or is forked from a parent process, or runs / is run by an external program. The code is meant to be portable across many UNIX variants.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    pamtester is a tiny utility program to test the pluggable authentication modules (PAM) facility, specifically designed to help PAM module authors to intensively test their own modules.
    Leader badge
    Downloads: 63 This Week
    Last Update:
    See Project
  • 8
    KINEC Is Not Encrypted Chat is a client/server chat program designed to keep you secure. It uses strong algorithms for encryption and authentication and will not compromise security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    yafic is Yet Another File Integrity Checker, similar to Tripwire. yafic, however, is fast, simple, and yet flexible. Config files are similar to Tripwire's, even supporting flag templates. It uses SHA-1 as its hash function.
    Downloads: 2 This Week
    Last Update:
    See Project
  • Information Security Made Simple and Affordable | Carbide Icon
    Information Security Made Simple and Affordable | Carbide

    For companies requiring a solution to scale their business without incurring security debt

    Get expert guidance and smart tools to launch or level up your security and compliance efforts without the complexity.
    Learn More
  • 10
    loginote is a program to immediately display a note on screen (using xosd) when a user logs into the system or logs out again. Just imagine someone knows your password and you might be interested when he/she logs into your system.. ;). loginote will tell
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    bddshell is a command line program for deductive database-based analysis. Its primary focus is software vulnerability detection. It acts as a front-end to a number of other programs, such as bddbddb and joeq.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    CryptoHelper is a Java program designed to aid in the decryption of classical ciphers, ie pre WWII ciphers. It brings together tools like frequency analysis, friedman tests, enciphering/deciphering for several clasical ciphers, and brute force algorithm
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Powerful password manager program with: - Use OpenSSL - Based on Plug-ins structure - NT Authorization - Multi-user - Make movable media - Auto fill HTML form - Remember password of applications - Backup/Restore - Import/Export (and more...)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    The software implements an adaptive steganography algorithm called Adaptive Minimum Error Least Significant Bit Replacement(AMELSBR) along with AES 128, 192 and 256 bit cipher for 24-bit bitmap files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Web Scanner is a command-line program that is designed to scans web servers to find default and potentially vulnerable web pages. 2.0 - Java, 1.3 - Perl Web scanner supports both HTTP and HTTPS protocols and can be configured to use custom data files.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    This is a simple protection system made in C++. This is my 3th program :). Its like a keygen
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    XSServer is a system, which is intented to be an easy way to configure dhcp, iptables and squid in order to make possible to have those working together at once, generating the needed config files for each.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    SharedSecret is a program used to negotiate a shared secret (password) by two hosts in secure way over the Internet. The software is written in C, based on client/server architecture with initial intention to run on POSIX-Compliant Operating Systems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    script_setuid is a simple but secure wrapper, that enables an interpreted program such as shell and/or python scripts to be run with different privileges.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    tcpick is a textmode sniffer; it tracks tcp streams, shows the status, reassembles and saves the data captured in files or displays them in the terminal in different modes (ascii, hex..). There is a color-mode. Useful to get files passively.
    Leader badge
    Downloads: 22 This Week
    Last Update:
    See Project
  • 21
    This is an experimental program that encrypt/decrypt/divide/join files. This program uses a new algorithm made by me, this algorithm is experimental and I working on it, every day this algoritm will be better.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    A Java program to encrypt files and make them relatively safe for transfers across networks. Currently just in commandline form, but an application is in the works.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    EtherMan: Ethernet Man In The Middle Attack Tool. It is capable of forcing traffic between two hosts to pass by a third party (MITM) and then redirected to its original destination again. This program is written for educational reasons, and I am not res
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Security Advisor is a program designed to analyze and report security issues beyond application vulnerabilities. The program will analyze system and network configurations to recommend ways for improving security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Multiprecision unsigned number template library (MUNTL). The program is intended for the organization of calculations with the big precision for unsigned numbers. Program is very fast because do not use any heap call (new, malloc etc.)
    Downloads: 0 This Week
    Last Update:
    See Project