Showing 9 open source projects for "data.6bin"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Earn up to 16% annual interest with Nexo. Icon
    Earn up to 16% annual interest with Nexo.

    Access competitive interest rates on your digital assets.

    Generate interest, borrow against your crypto, and trade a range of cryptocurrencies — all in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • 1
    Full Stack Computer Scanner

    Full Stack Computer Scanner

    Scans for Windows computer system integrity

    The Full Stack Computer Scanner is a read-only Windows security diagnostics tool for system awareness. No ads. No accounts. No data collection. Fully offline. Scans for computer system integrity. Complements antivirus. Only official binaries from this SourceForge project are legitimate. Online cloud versions are unauthorized. Keith | KCJ Tech Solutions | 30+ yrs IT Hacked? Unsure your system is secure? Contact: fullstackcomputerscanner@gmail.com Windows Computer Security Check (chat only, no remote access): 20 min $40 | 40 min $80 | 21+ Free version limited. ...
    Leader badge
    Downloads: 10 This Week
    Last Update:
    See Project
  • 2
    messor-opencart

    messor-opencart

    Messor Security - IPS/WAF anti DDOS/bot and more for OpenCart3

    Messor Free open source extension for OpenCart to protect your store. Each network member collects intruders and attacks data and then sends it to central servers, as well as distributes the current database to the rest network participants. The current concept provides real-time protection of your store from the network attacks.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 3
    PhishBlock

    PhishBlock

    A program that detects and blocks phishing, pharming, Hacker's C&C.

    PhishBlock is a security program that detects and blocks Phishing, Pharming, Hacker’s C&C(Command and Control) Servers which are located in databases with URLs, DNS hostnames, and IP Addresses. This program detects and blocks Malware URLs, bad Hosts, and bad IP addresses. Recently, most malware codes are delivered covertly to users’ personal computers through Google ads, SNS, Blogs, BBS and so on, which users visit often. And After the malware codes connect the C&C server(or...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Stealth VM For Ubuntu & All Derivatives

    Stealth VM For Ubuntu & All Derivatives

    Run Windows XP & 7 Virus Free Inside Ubuntu & All Derivatives

    ...Indeed that is a problem you are looking to solve as quickly as possible. Stealth VM Software has solved your Windows to Linux migration dilemma already! You don't need to worry about viruses or malware infecting Windows & its data because Stealth VM Software invented by Robolinux keeps a protected clone of Windows and mirrors your data in a secure Ubuntu Linux partition.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • 5
    Stealth VM For Linux Mint

    Stealth VM For Linux Mint

    Run Windows XP & 7 Virus Free Inside Linux Mint

    ...Indeed that is a problem you are looking to solve as quickly as possible. Stealth VM has solved your Windows to Linux migration dilemma already! You don't need to worry about viruses or malware infecting Windows & its data because the Stealth VM Software invented by Robolinux keeps a protected clone of Windows and mirrors your data in a secure Linux Mint partition.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    tcpview (aka wirefox)
    Common network dump analyzer tool to extract application data and pretty show. It reassembles and shows HTTP/SMTP/POP3/IMAP etc files. Please donate if you want this to be a candy.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Migale eraser is a software permitting to erase safely any file or folder from your hard drive so that no recovery will be possible, even when using forensic tools.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Zero-Trust-File-Access-Demo

    Zero-Trust-File-Access-Demo

    Zero Trust architecture at the file system level

    Implement the Zero Trust File Access Control with encryption enabled, it can enhance the file security. By default all files will be encrypted automatically, all processes or users can't read the encrypted files, they will get the raw encrypted data. You can authorize the processes or users to access these encrypted files. EaseFilter File Control Filter Driver allows you to control the file I/O operations with the filter rule configuration by setting the whitelist and blacklist processes or users, you can allow or block the specific file I/O operation to the specific process or user, you can control who can read your file, allow or block the file modification, prevent your important file from being deleted, renamed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    ProcessFilterExample

    ProcessFilterExample

    EaseFilter Process Filter Driver SDK

    ...By intercepting process and thread operations at the kernel level, it enables the development of robust security applications that can prevent unauthorized or malicious processes from executing. With the Process Filter Driver, it allows you to prevent the untrusted executable binaries (malwares) from being launched, protect your data being damaged by the untrusted processes. It also enables your application to get the callback notification for the process/thread creation or termination, from the new process information you can get the parent process Id and thread Id of the new created process, you also can get the exact file name that is used to open the executable file and the command line that is used to execute the process if it is available.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Compliant and Reliable File Transfers Backed by Top Security Certifications Icon
    Compliant and Reliable File Transfers Backed by Top Security Certifications

    Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.

    Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
    Start Free Trial
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB