Search Results for "/storage/emulated/0/android/data/net.sourceforge.uiq3.fx603p/files" - Page 28

Showing 1555 open source projects for "/storage/emulated/0/android/data/net.sourceforge.uiq3.fx603p/files"

View related business solutions
  • Run applications fast and securely in a fully managed environment Icon
    Run applications fast and securely in a fully managed environment

    Cloud Run is a fully-managed compute platform that lets you run your code in a container directly on top of scalable infrastructure.

    Run frontend and backend services, batch jobs, deploy websites and applications, and queue processing workloads without the need to manage infrastructure.
    Try for free
  • Get full visibility and control over your tasks and projects with Wrike. Icon
    Get full visibility and control over your tasks and projects with Wrike.

    A cloud-based collaboration, work management, and project management software

    Wrike offers world-class features that empower cross-functional, distributed, or growing teams take their projects from the initial request stage all the way to tracking work progress and reporting results.
    Learn More
  • 1
    LOIC-SLOW

    LOIC-SLOW

    LOIC-0 WITH SOME LOWBANDWITH NETWORK STRESSING TOOLS ADDED

    LOIC-SLOW Low Orbit Ion Cannon- Special Lowbandwith Operating Weapon LOIC-SLOW stands for LOIC - Low Orbit Ion Cannon SLOW - Special Lowbandwith Operating Weapon THE NEXT GENERATION OF LOIC-0 DISCLAIMER: USE ON YOUR OWN RISK. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER OR CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES. ...
    Downloads: 9 This Week
    Last Update:
    See Project
  • 2
    ...The first is an encryption / decryption string which we will allow to be up to 128 lower case alphabetical characters in length. The second string is a line of text from a file that is to be encrypted or decrypted. the basic strategy for encrypting data is based on mapping alphabetical characters to specific values, then doing some simple mathematical operations to create a new value.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    CloudSafe

    CloudSafe

    Smart and safe cloud-based credential manager

    CloudSafe is a credential manager that can store all your access informations (applications, sites, gadgets, ...), in your Google Drive account: all data are encrypted with a master password (AES-128) and all netowork operations are protected by your Google Account and HTTPS connections. The source code is open and you are free to check the security solution.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Supplementary files for Georgia Weidman's Penetration Testing: A Hands-On Guide to Hacking (No Starch Press, 2014) https://www.nostarch.com/pentesting
    Downloads: 5 This Week
    Last Update:
    See Project
  • Manage your Classes Icon
    Manage your Classes

    For educational organizations looking for a class management software of size of school, academy or studio

    DreamClass helps you efficiently manage all of your processes. Enjoy professional school management for any educational institution, in minutes!
    Learn More
  • 5
    virus doctor

    virus doctor

    shortcut virus remove and USB files rebuilds

    ...Usually these kind of situations virus may not present in USB because your virus guard will not do anything. By using this simple software you can rebuild your USB files and remove virus from the computer and from the device, if present.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 6
    USB Shortcut VIRUS remover

    USB Shortcut VIRUS remover

    This simple program removes the shortcut virus from the USB.

    PS. this is not an antivirus !!! This simple program removes the shortcut virus from the USB. This will enable you to have access to the files without clicking on the shortcut icon (this silly one YES!!). You will have to follow these steps: 1- insert your infected USB storage device 2- record the USB drive letter (eg. E: F:) 3- open usb-shortcut-remover.hta file. 4- enter the device letter in the empty text field. 5- click the arrow next to the text field. 6- wait until it is done. 7- access your USB drive. you will find an unnamed folder. 8- access the unnamed folder, you will find all your files. ...
    Leader badge
    Downloads: 351 This Week
    Last Update:
    See Project
  • 7
    File Locker

    File Locker

    Lock and unlock files easily in Windows

    Lock and unlock your personal files easily with this tool. You can just right click on a file and immediately lock it with your password. And when a file is locked, you can just double click it and enter your password to open it. It uses serious encryption algorithm, so be careful with your password! If you forget it, your file might permanently get unlockable.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 8
    Quick Hash GUI

    Quick Hash GUI

    Linux, Windows and Apple Mac File Hashing GUI Tool

    This project has moved to www.quickhash-gui.org as of 2016-12-04. I kept v2.6.9.2 and below hosted here since Dec 16 but too many people were ignoring the fact that no updates were being posted here. For the latest QuickHash v2.8.4 release (Aug 28th 2017), go to www.quickhash-gui.org, and note that as of 29/12/16 a Debian package is also available
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    LockyMonitor

    Windows Service to check if files has been changed by ransomware

    Windwos Service to check if files has been changed by crypto ransomware. It does not prevent from ransomware infection! Don't use it in productive environments to prevent data loss! The Software comes without any warranty. If files has been changed it send a email and shutdown or disconnect the host or stop the server (LanmanServer) service to disconnect all shares on the server.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Boon: The Agile Referral Hiring Platform Icon
    Boon: The Agile Referral Hiring Platform

    Tap your entire community to hire better talent, faster

    Boon's agile referral platform expands your recruiting power 
through AI, automation, integrations, and gamification.
    Learn More
  • 10

    ST&E Manager

    ST&E tool provide a framework collecting and analyzing scan data

    ...DISA has provided a number of automated tools that produce STIG checklist results, but they suffer from various shortcomings. The ST&E Manager, originally created as a set of Perl scripts written to try to eliminate paper checklists and make sense of a mountain of scan data, has grown into a fullfledged web application that makes the ST&E data management problem much more manageable.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    LockyMonitorConsole

    Console app to check if files has been changed by crypto ransomware

    Console application to check if files has been changed by crypto ransomware like Locky. It does not prevent from ransomware infection! Don't use it in productive environments to prevent data loss! The Software comes without any warranty. If files has been changed it send a email and shutdown or disable the network interfaces of the host. It runs under the user account and monitor drives which are connected to a server share.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    BoarderZone ASNalyzer
    A 100% pure Java Swing ASN.1 analysis utility for inspecting arbitrary BER-encoded data files. It allows inspection of data with unknown structure, can drill down to any nesting level and allows to interpret embedded OCTET STRING data recursively.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 13

    IP2LocationLookupTool

    Allow you to lookup IP address with geo-location information

    ... * Country * Region * City * Latitude & Longitude * ZIP Code * Time Zone It supports both the IPv4 and IPv6 address. Please take note that this component requires the “IP2Location DB11 BIN” data file and “IP2Location Java Component” to function. Below are the download links: * IP2Location DB11.LITE BIN (free version): https://lite.ip2location.com/database/ip-country-region-city-latitude-longitude-zipcode-timezone * IP2Location DB11 BIN (commercial version): https://www.ip2location.com/databases/db11-ip-country-region-city-latitude-longitude-zipcode-timezone * IP2Location Java Component: https://github.com/ip2location/ip2location-java SUPPORT Home page: https://www.ip2location.com Email: support@ip2location.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    LockyService

    Windows Service to monitor file events for crypto ransomware

    Windows Service to monitor drive c: for file events with crypto specific file extensions or with big file entropy. It does not prevent from ransomware infection! Don't use it in productive environments to prevent data loss! The Software comes without any warranty. When a alarm is triggerd it send a email and shutdown the host or disable the network interfaces. The alarm can be triggerd if locky extensions were found. Or if files were probably encrypted (big file entropy level). Or if a file event counter exceeds the allowed number of events in a certain periode of Time. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    OpenShredder

    OpenShredder

    File Shredder Project

    Openshredder is os independent secure file deletion tool.It is very light weight and useful.It uses standard Zero and DoD algorithms.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 16
    AutoVPN

    AutoVPN

    Create on demand disposable OpenVPN endpoints on AWS

    Script that allows the easy creation of OpenVPN endpoints in any AWS region. Creating a VPN endpoint is done with a single command that takes ~3 minutes. It will create the proper security groups. It spins up a tagged ec2 instance and configures OpenVPN software. Once the instance is configured an OpenVPN configuration file is downloaded and ready to use. There is also functionality to see which instances are running in which region and the ability to terminate the instance when done....
    Downloads: 2 This Week
    Last Update:
    See Project
  • 17
    PushSharp

    PushSharp

    A server-side library for sending Push Notifications to iOS

    PushSharp is a server-side library for sending Push Notifications to iOS/OSX (APNS), Android/Chrome (GCM/FCM), Windows/Windows Phone, Amazon (ADM) and Blackberry devices! PushSharp v3.0+ is a complete rewrite of the original library, aimed at taking advantage of things like async/await, HttpClient, and generally a better infrastructure using lessons learned from the old code. PushSharp will now follow semver versioning, so major version numbers will go up as there are any breaking API changes. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Base64encoder

    Base64encoder

    Convert files to Base64!

    Simple way to encode files and images in base64... Tutorial: http://www.youtube.com/watch?v=G1cQXnzOwcs
    Leader badge
    Downloads: 18 This Week
    Last Update:
    See Project
  • 19
    General software and open source projects
    Downloads: 9 This Week
    Last Update:
    See Project
  • 20
    Rose Crypt provides users with a simplistic application that can be used for encrypting files in your computer using a custom passphrase. With its minimal design, Rose Crypt can be used by both advanced and beginner users. Once the encryption process is finished, you can access the newly created file from the location you previously selected.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    With this application you can encrypt texts or files and chat with friends. You can download a early Android version of the chat client from here: https://drive.google.com/uc?export=download&id=0BwePHaWdtoMweWRyMExqbHZyUEk Hint: I started this project because i have fun to write java apps. This app is not professional. I don´t recommend using this to encrypt very important data (for example of your company ...).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Inscribe | Data Security and Privacy

    Inscribe | Data Security and Privacy

    Inscribe is a easiest tool to encrypt your valuble data from everyone

    Make your data encrypted in a few clicks! Inscribe by Crypto Ststems helps you cut down development time by providing you with a flexible data encryptor interface. Inscribe is one of the easiest data encryptor tools available today. It also gives you the freedom to encrypt as much data as you like given the fact that it is a desktop app.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    TLSBench

    A tool for benchmarking the TLS performance of Cloud database systems.

    TLSBench is a tool for benchmarking the performance of Transport Layer Security (TLS) in cloud storage systems / cloud database systems like Apache Cassandra, Apache HBase, and Amazon's DynamoDB. This tool is built for research purposes. A paper which describes the general benchmarking approach and some experiments is available here: http://www.aifb.kit.edu/images/5/58/IC2E2014-Performance_Overhead_TLS.pdf.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Imetion Security Castle
    Imetion Security Castle is a Best Tool Kit for protect your Datas. You can Encrypt your Text files, rich text files, code text files and electronic voice encrypt file and zip any files in your own extentions like *.zip/ *.rar/ *.mp3/ *.mp4 ect. **
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    G Security Windows Locker

    G Security Windows Locker

    A smart, secure, advance and easy to use desktop locker for Windows.

    ...G Security is light and easy to use with a highly user friendly interface. It prevents anyone from accessing your computer when its locked down so that your private data stored on the computer cannot be accessed by anyone. It completely locks down your computer so that even if someone gets a hold of your computer, he or she can do nothing on it. It can lock down your computer on start up as well as any time you want just by pressing some keys. Once the computer is locked down shortcut keys will not work at all. ...
    Downloads: 5 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB