Search Results for "code encryption cd" - Page 16

Showing 514 open source projects for "code encryption cd"

View related business solutions
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1
    SVAR extract is a python (and partly C) piece of code that exctract the contents of the Swedish SVAR CD:s. It can be used for automated searches in the SVAR CD databases.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    OFormsCI

    Continuous Integration for Oracle Forms/Reports Fusion Middleware

    OFormsCI is a set of tools to form a complete tool chain for continuous integration with Git, Jenkins, Oracle Forms/Reports and WebLogic server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    video encryption

    video encryption

    Light video encryption technique (source code)

    Light encryption algorithm (technique) that can be used in real time video encryption. (source code has been uploaded; You can read attached pdf file for more details about the presented encryption technique ! )
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    MacCipherSaber

    Encryption shell for classic MacOS.

    A classic MacOS wrapper for plug-ins implementing Arnold G. Reinhold's CipherSaber specification (which is now believed to be insecure). The wrapper provides a user interface for the encryption code and is intended to make it easy for a coder to implement the specification without having to go through the drudgery of designing a UI. MacCipherSaber does not PERFORM encryption -- it's a wrapper for PLUGINS (not supplied) that the USER MUST WRITE in order to perform the encryption. MacCipherSaber only handles user interface management.
    Downloads: 0 This Week
    Last Update:
    See Project
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • 5
    V Shepherd Copyright Protector

    V Shepherd Copyright Protector

    Protect your intellectual Properties

    V-Shepherd Copyright Protector is a PHP script developed by Agbajelola Olasunkanmi Julius to solve the problem of copyright infringement and the theft of intellectual properties among film makers, E-book Authors, musicians, softwares developers, and those who sell Digital goods on the Internet. To bid farewell to intellectual sabotage and piracy, get this script, it is very easy to install on any webhost. It encrypts and store your files for 1988 hours or more. You can use it to store...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    Emporium

    CD database GUI

    Emporium is a java/swing code sample obtaining a database of CD information and displaying it through a graphical user interface.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    PostX Gnu/Linux (Was Audax Gnu/Linux)

    PostX Gnu/Linux (Was Audax Gnu/Linux)

    PostX is a Debian based distribution.

    PostX is a lightweight Linux distribution with a Fluxbox desktop based on Debian (7). By default the distribution uses only free software. The distribution can also be burnt to a single cd or a usb stick due to its small size. The overall system is designed to be lightweight and as such it uses low amount of RAM and remains suitable for an older hardware. PostX can be used directly from a media as a live distribution or installed to a hard drive. The live-mode default username...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    tivic v1.3b (live plugin) This project an addon method that uses Wowza Streaming Engine to deliver all media chunks and encryption(pubs/watchs) keys with mysql so.. is a professional publisher/watcher secure protect the same like "twitch , livestream , ustream , etc.." all of the software can be easy integration (self Php code,WHMCS,etc..) and works realtime(update,write,reading) sync your database..
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    A simple java program that generates a random password. Requires Java preinstalled. Instructions: 1. Download the jar file, and save it on your computer 2. Open command prompt in windows (search for cmd) 3. Type "cd" followed by the path of the directory that contains the jar file 4. Type "java -jar RanPassGenv1.jar" 5. Follow the instructions that appear in command prompt. This was a simple test program I made in 15 minutes. You can use it or the source code however you want.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 10
    VCipher

    VCipher

    A Social Media Encryption/Decryption Tool

    VCipher is a unique encryption and decryption tool.The code is not unique rather it is quite simple as it uses Vigenère cipher algorithm but the idea is quite unique.It is created to be used as an extra layer of protection for social networking sites,so even if someone's account is hacked it will take them so expertise to read those messages.And if used correctly it can also be made uncrackable if used correctly.This is a CLI(Command Line Interface) there is a web version too. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Theme-ix

    Theme-ix

    Themed Linux re-spins for the masses

    Theme-ix is the code name for any ISOs produced for general distribution by RichJack as part of the Linuxthemer project. They are re-spins offered up as an example of some of the work I have done theming Linux on various base systems. Xbluebuntu - is the first release and is a light-weight clone of Xubuntu on a Debian testing base. Chromixium - is the second release and is a clone of ChromeOS based on Ubuntu 14.04 LTS. Please see the dedicated Sourceforge page:...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Yron Linux (Philentropy)

    Yron Linux (Philentropy)

    We are writing the source code of Freedom.

    Philentropy presents Yron Linux. The next revolution of distributions for Open Source people. Based on LFS and from source packages, Yron Linux is available for free and you can download it without any charges. We will release a beta version soon. Be patient and stay tuned ! ------------------------------------------------------------- Philentropy vous dévoile Yron Linux. La nouvelle révolution des distributions pour les adeptes du Logiciel Libre. Basé sur LFS et les...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    STM324x9I-EVAL QPC port with LWIP

    Port of the QPC 5.3.0 RTOS framework to the STM324x9I-EVAL2 dev kit.

    ...BSP - Bootloader specific BSP that pulls in the shared BSP Shared BSP CMSIS STM32F4xx device drivers Serial/UART Time/RTC Ethernet (STM32 MAC) driver QPC implementation of the LWIP network driver interface STM32 specific init and optimizations. Flash driver DP83848 Ethernet PHY driver ISR implementations Linker script System - RTOS, network stacks, encryption stacks, console debugging, etc. QPC RTOS/Framework LWIP network stack Shared System Processor and board support TODO: Update this when the final board is released. The code is completely
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    BEDBUG CSPRNG & Stream Cipher

    BEDBUG CSPRNG & Stream Cipher

    A family of FLEA-inspired CSPRNGs and Stream Ciphers

    BEDBUG is a small, fast, cryptographically secure pseudo-random number generator (CSPRNG) and stream cipher. It exhibits uniform distribution, mixes rapidly (with worst-case avalanche better than 16-bits), has no detected bias, and comes in three variants: BEDBUG128, with an internal state array of 128+3 32-bit words; BEDBUG256, with an internal state of 256+3 words; and BEDBUG512 with a 512+3-word state. The former permit seeding with a key of up to 4096 or 8192 bits, the latter with a...
    Downloads: 13 This Week
    Last Update:
    See Project
  • 15
    MOTE CSPRNG & Stream Cipher

    MOTE CSPRNG & Stream Cipher

    A family of small-state CSPRNGs and Stream Ciphers

    MOTE is a fast, small-state, cryptographically secure pseudo-random number generator (CSPRNG) and stream cipher. MOTE exhibits uniform distribution, mixes extremely rapidly, has no detected bias, and comes in three variants: MOTE8, with an internal state array of 8+4 32-bit words; MOTE16, with an internal state of 16+4 words; and MOTE32 with a 32+4-word state. The former permit seeding with a key of up to 256 or 512 bits, the latter with a 1024-bit key. Reduced to essentials, MOTE is only...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    SES Super-Encypherment Scrambler

    SES Super-Encypherment Scrambler

    SES brings back the uncrackable onetime pad, with a digital twist.

    SES brings back the uncrackable onetime pad, with a digital twist. It is well known that a random key of message-length is the only provably unbreakable cipher. SES uses cryptographic strength pseudo-random keys of message-length for its many encipherments, in addition to offering true one-time pad capability for the intrepid. SES is built on ISAAC, Bob Jenkins' unbroken CSPRNG, a fast and simple stream cipher placed in the Public Domain in 1996. SES now gives you the ability to...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17
    DCue

    DCue

    A CLI audio cue file generator which uses the Discogs.com API

    DCue is a command line tool for automatically generating audio cue sheets (.cue files) using the massive release database from Discogs.com to find artist names, track titles, durations and other information via the Discogs API. DCue is equally compatible with Windows and Linux (and probably OS X -- though not officially supported). It has no external dependencies whatsoever. It makes use of some C++11 features where available. Full documentation and information about support and...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 18
    TEACryptor

    TEACryptor

    Encrypts text files

    Uses the Tiny Encryption Algorithm to encrypt text files. This program can only encrypt text files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Rump Kernels

    Rump Kernels

    Componentized and easy-to-integrate kernel quality drivers

    Rump kernels host unmodified NetBSD kernel drivers, such as file systems and the TCP/IP stack, on top of a high-level hypercall interface. The hypercall interface is straightforward to implement and is available for example for userspace and the Xen hypervisor. In other words, rump kernels enable embedding unmodified kernel drivers in various environments and using the drivers as services. For more information join our mailing list: https://www.freelists.org/list/rumpkernel-users Or...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Manjaro Awesome WM Respin

    Manjaro Awesome WM Respin

    A Manjaro Linux respin based on the popular 'awesome window manager'

    THIS PROJECT HAS MOVED TO: https://sourceforge.net/projects/manjarodev/files/users/culinax/awesome/ ____________________________________________________ Manjaro Awesome WM Respin -codenamed Cesious- is a respin of Manjaro Linux. It uses the very powerful dynamic tiling window manager 'awesome'. It is mainly targetted at people who are new to tiling WMs, or experienced people who want to have a fully functional system after the installation. Links. Forum Thread -...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    ISC - The ISAAC Stream Cipher

    ISC - The ISAAC Stream Cipher

    ISC lets you encrypt & decrypt text and files of any type up to 4GB

    ISAAC is a cryptographically secure pseudo-random number generator (CSPRNG) and stream cipher. It was developed by Bob Jenkins from 1993-1996 and placed in the Public Domain. ISAAC is fast - especially when optimised - and portable to most architectures in nearly all programming and scripting languages. After more than 20 years of existence ISAAC has not been broken, and the little program you have here allows you to use it to encrypt and decrypt text of arbitrary length, files of any...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22
    XOR encrypt v2.0

    XOR encrypt v2.0

    Encrypt Your Text documents with XOR encryption

    This software provides an easy graphical way to encrypt your text documents from source code , text files ,scripts even jpeg files .It is a enhanced version of my earlier project https://sourceforge.net/p/xorencrypt which used win32 GUI . This is a demonstration of working of XOR encryption which was used by Germans in World War II (http://en.wikipedia.org/wiki/Lorenz_cipher) . Besides from XOR'ing the message with password after every encryption the key changes pseudorandomly. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 23

    sshtun

    The poor man's VPN: Tunnel your applications to remain anonymous

    A Linux application. REQUIRES python3.2+ REQUIRES git How to get it working, as easy as 1, 2, 3 !: 1) git clone ssh://zeroblue@git.code.sf.net/p/sshtun/code sshtun-code 2) cd sshtun-code 3) sudo python3 setup.py then run the program: python3 SSHTunnel.py If something goes wrong you will likely have to install the dependencies yourself: Namely, PySide for python3 http://qt-project.org/wiki/PySide_Binaries_Linux You should also have openssh and firefox(optional) installed. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    Virus Free CD

    Temporaly makes your computer immune to viruses or other harm

    ...It works via Knoppix Live-CD, except there is no write access to the hard drive. It has been simplified and harden down to prevent attack. If there is any, the only code will be in in the computer's RAM. Once the computer is restarted, the RAM is cleared and there is no harm done. I spent a year trying to market it. Now it's open source and I hope someone will be able to enjoy the many, many hours I spent on it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    CryptoX

    AES Encryption Program

    v2.0.0 (Latest) ---CHANGE LOG--- v1.0.0 - Original Release v1.0.1 - Source Code Cleanup v2.0.0 - Now Features File Encryption Protect your privacy! Encrypt your messages and files with a cryptographic strength of up to 256 bits before sending them to others!
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB