Search Results for "/storage/emulated/0/android/data/net.sourceforge.uiq3.fx603p/files" - Page 62

Showing 1557 open source projects for "/storage/emulated/0/android/data/net.sourceforge.uiq3.fx603p/files"

View related business solutions
  • ShareCRM is an AI-powered enterprise CRM platform designed to connect data and teams across the entire customer lifecycle. Icon
    ShareCRM is an AI-powered enterprise CRM platform designed to connect data and teams across the entire customer lifecycle.

    Trusted by 6000+ Large and Medium Enterprises

    ShareCRM is an AI-powered, customizable and affordable enterprise CRM solution to seamlessly integrate and empower every aspect of your business.
    Learn More
  • OpManager the network monitoring software used by over 1 million IT admins Icon
    OpManager the network monitoring software used by over 1 million IT admins

    Network performance monitoring, uncomplicated.

    ManageEngine OpManager is a powerful network monitoring software that provides deep visibility into the performance of your routers, switches, firewalls, load balancers, wireless LAN controllers, servers, VMs, printers, and storage devices. It is an easy-to-use and affordable network monitoring solution that allows you to drill down to the root cause of an issue and eliminate it.
    Learn More
  • 1
    SecureProxy is an proxy application which sits in front of a web server and enforces general security policies which prevent clients from accessing restricted portions of the website or providing dangerous or unauthorized input.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    This program hidden inside compressed files of images, then these files can be extracted as if it were a tablet.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    Cake Fuzzer

    Security testing tool for CakePHP based web applications

    ...The goals of the project are: - create an automated process of discovering vulnerabilities in applications based on the CakePHP Framework; - no application knowledge requirement or pre-configuration of the web application; - result with minimal or close to 0 amount of false positives; - require minimal security knowledge to run the scanner.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    FileHide hides files from anyone not familiar with the windows environment.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Infor M3 ERP Icon
    Infor M3 ERP

    Enterprise manufacturers and distributors requiring a solution to manage and execute complex processes

    Efficiently executing the complex processes of enterprise manufacturers and distributors. Infor M3 is a cloud-based, manufacturing and distribution ERP system that leverages the latest technologies to provide an exceptional user experience and powerful analytics in a multicompany, multicountry, and multisite platform. Infor M3 and related CloudSuite™ industry solutions include industry-leading functionality for the chemical, distribution, equipment, fashion, food and beverage, and industrial manufacturing industries. Staying ahead of the competition means staying agile. Our new capabilities bring improved data-driven insights and streamlined workflows to help you make informed decisions and take quick action.
    Learn More
  • 5
    Quick-Safe

    Quick-Safe

    Generate strong and secure passwords with QuickSafe ,

    QuickSafe is an open-source password generator designed to bolster online security by generating robust and secure passwords. This project addresses the growing need for enhanced password strength in the face of escalating cyber threats. QuickSafe empowers users to create highly secure passwords through a diverse character set, including uppercase and lowercase letters, numbers, symbols, and more. With the increasing frequency of online security breaches, having a reliable password generator...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    AceJudge is a system for managing programming contests. AceJudge's basic features include automatic judging of submitted programs, answering to clarification questions about problem descriptions, reevaluation of programs, real time ranking etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Forensic Registry File Reader(FRFR) - Is a 100% C# .NET project aimed to provide full forensic analysis of an offline registry file, no windows API being used, all of the registry structure been reconstructed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    Xrypt

    User-Defined Alternative method Cryptography Client

    A client for encrypting text files. It uses its own unique alternative method that is unlike any other known methods.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    CRYPTOKIT

    Home Text Encryption Tool

    Cryptokit is a Securit software for text encryption for you sensible data without regard of what kind of source is
    Downloads: 0 This Week
    Last Update:
    See Project
  • The #1 solution for profitable resource management Icon
    The #1 solution for profitable resource management

    Designed to give Operations and Finance leaders the insight and foresight they need to achieve profitable delivery at scale.

    Unlike spreadsheets or clunky PSAs, Float offers a clear, centralized view to schedule teams, plan capacity, estimate work, and track margins in real-time so that you can keep your people and profits on track.
    Learn More
  • 10

    Tread AES Encryption Decryption

    AES Encryption Decryption

    Usage: ---------------------------------------------------- TreadAES.exe {key} {input_path} {output_path} {mode} TreadAES.exe test ---------------------------------------------------- key = hexidecimal key e.g 0x00112233445566778899aabbccddeeff input_path = input file output_path = output file mode = 'encrypt' or 'decrypt' Note: paths are absolute test mode will run unit tests only Files are not to be overwritten Author: Hayden Virtue 2012 Implementation of Nov 2001 Unclassfied AES standard http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    SecureShareExample

    SecureShareExample

    EaseFilter File Secure Sharing Example

    EaseFilter DRM Secure File Sharing example was implemented with the Transparent File Encryption and Control Filter Driver SDK. The shared file was encrypted with a unique 256-bits key, store the file access policies in a central server, share the encrypted files with fully control. You can grant, revoke or expire the file access at any time, even after the file has been shared. Digital Rights Management (DRM) enforces how files can be viewed, copied, printed, shared, or modified. Instead of granting blanket access, DRM attaches enforceable usage policies to content. With EaseFilter DRM, you can: Restrict access to authorized users, devices, and applications only. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Galloper is a tool set to assist in pseudo anonymous analysis on data from multiple distrusting sources without the need for a trusted third party.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Most of the projects needs data to be securely transfered across the network. Despite of lot of open source API, developer still feels that implementing PKI in the application is tough. This API helps to easily incorporate PKI for JAVA application
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    SecondFactor

    SecondFactor

    Two-Factor Authenticator for Windows.

    Need a two-factor authenticator for your computer? Tired of using your phone to log in to a website on your desktop? Introducing SecondFactor, a One-Time-Password Authenticator for Windows. SecondFactor supports Time-based One Time Passwords, which can be added directly, using a QR Code, or with an OTPAUTH URL. Your Secrets are stored securely for your local account, with the option to protect the program with a password for advanced security. The main window of SecondFactor provides...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    C#/Win32 project for capturing images from a webcam or other video input device for home-grown security applications. Will support capture of images from multiple cameras and update local and remote files with the latest imagery.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    AresCode2008 is system to crypt files. System is used new cryptography algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Black Hole is a GPG frontend. The GUI has is file browser where you can drag and drop your files for being encrypted.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    KomodoPGMP is a cryptographic protection and compression tool for executable files. The project takes malicious code enhanced privacy to the next level.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Time-stamp of a created file can be modified by attacker. This project is meant to track File timestamp values , using NTFS data structures rather than trusting the original time stamp modified by attacker.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    RemoteEdit is a cross-platform graphical FTP and SFTP client for remotely editing text files with a user-specified text editor.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Seagull is a peer to peer network client software that allows user to communicate and share files over secure connections and secure peer to peer identification and handshaking.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Remote Web Logger is a remote web transaction logging daemon. It operates by passive monitoring of web server traffic to translate web session data to transaction log entries that are written to standard log services such as syslog.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    JSleuth is a system base lining collection tool. The primary purpose of Sleuth is to gather and/or develop topographical information and attributes about specified directories and files in a manner conducive to allow the baseline to be compared against.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    FileProtectorExample

    FileProtectorExample

    EaseFilter File Access Controk SDK

    The EaseFilter File Control SDK is a powerful development toolkit for creating robust, kernel-level file security and data protection solutions on the Windows platform. It includes a high-performance file system filter driver that intercepts and manages all file I/O operations in real time, giving developers deep, granular control far beyond what is possible with standard Windows APIs or Access Control Lists (ACLs). The EaseFilter Control Filter Driver provides a powerful method for intercepting file I/O operations at both the pre-operation and post-operation stages. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    This project will be used for the identification of the thumb impression. We will be having a image of thumb in our database and will use another image for matching purpose. We can also match the images which are not in the data base.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB