Showing 16 open source projects for "data.6bin"

View related business solutions
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 1
    Securepoint Squid eCAP Antivirus adapter

    Securepoint Squid eCAP Antivirus adapter

    Antivirus eCAP adapter for Squid 3.1 and above.

    Securepoint Antivirus eCAP adapter for Squid 3.1 and above.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    messor-opencart

    messor-opencart

    Messor Security - IPS/WAF anti DDOS/bot and more for OpenCart3

    Messor Free open source extension for OpenCart to protect your store. Each network member collects intruders and attacks data and then sends it to central servers, as well as distributes the current database to the rest network participants. The current concept provides real-time protection of your store from the network attacks.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 3

    clam4j

    A java wrapper for clamd

    Clam4j is designed to be a java wrapper around ClamAV. Clam4j allows you to scan for viruses in java programs by providing a simple java interface which sends the data to clamd for scanning. The results of the scan are returned to the caller via a response object.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Windows Defender Central v0.5

    Windows Defender Central v0.5

    Windows Defender Central

    ...Updated the code: it is now compatible with build 2004 and it uses multithreading to query the machines. It uses PowerShell and SysInternalsSuite(PsExec.exe) to gather the information and it stores the data in a shared network drive (what the computers can access and have write access). It can store the data locally, if needed. What are the "computer name" background colors? -White: idle -Green: querying state -Pink: any other action besides querying -Red: one or more protections are disabled It can't show color on the highlighted row... ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Train ML Models With SQL You Already Know Icon
    Train ML Models With SQL You Already Know

    BigQuery automates data prep, analysis, and predictions with built-in AI assistance.

    Build and deploy ML models using familiar SQL. Automate data prep with built-in Gemini. Query 1 TB and store 10 GB free monthly.
    Try Free
  • 5

    LockyMonitor

    Windows Service to check if files has been changed by ransomware

    Windwos Service to check if files has been changed by crypto ransomware. It does not prevent from ransomware infection! Don't use it in productive environments to prevent data loss! The Software comes without any warranty. If files has been changed it send a email and shutdown or disconnect the host or stop the server (LanmanServer) service to disconnect all shares on the server. The FileSystemWatcher object raises the events for the files in the monitored target folder. If a file in the monitor folder is changed by a user or programm a false alarm will be raised! ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    LockyService

    Windows Service to monitor file events for crypto ransomware

    Windows Service to monitor drive c: for file events with crypto specific file extensions or with big file entropy. It does not prevent from ransomware infection! Don't use it in productive environments to prevent data loss! The Software comes without any warranty. When a alarm is triggerd it send a email and shutdown the host or disable the network interfaces. The alarm can be triggerd if locky extensions were found. Or if files were probably encrypted (big file entropy level). Or if a file event counter exceeds the allowed number of events in a certain periode of Time. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    LockyMonitorConsole

    Console app to check if files has been changed by crypto ransomware

    Console application to check if files has been changed by crypto ransomware like Locky. It does not prevent from ransomware infection! Don't use it in productive environments to prevent data loss! The Software comes without any warranty. If files has been changed it send a email and shutdown or disable the network interfaces of the host. It runs under the user account and monitor drives which are connected to a server share. Works with remote to local Symlinks on a server share. Can map and monitor drives by using the subst or net use command. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    USBizmo

    USB Gizmo for Dummies

    USB Gizmo for Dummies USBizmo is capable of restoring hidden files and directories from any USB devices.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    USBRescueX

    USBRescueX

    Rescue and clean your hard disk or USB memory, delete broken shortcuts

    USBRescuex in its version 2.1 is a computer program category in utility software for files and folders, which its main function is the recovery of hidden files, read-only and corrupted our device (either USB memory devices, removable storage or hard disk). Besides recover those important files for you , eliminates the famous RECYCLER virus , which is the basis of other USB flash drives for viruses , this virus is the main wrongdoer in your USB/Storage Device/Device Storage space Removable...
    Downloads: 6 This Week
    Last Update:
    See Project
  • Auth0 B2B Essentials: SSO, MFA, and RBAC Built In Icon
    Auth0 B2B Essentials: SSO, MFA, and RBAC Built In

    Unlimited organizations, 3 enterprise SSO connections, role-based access control, and pro MFA included. Dev and prod tenants out of the box.

    Auth0's B2B Essentials plan gives you everything you need to ship secure multi-tenant apps. Unlimited orgs, enterprise SSO, RBAC, audit log streaming, and higher auth and API limits included. Add on M2M tokens, enterprise MFA, or additional SSO connections as you scale.
    Sign Up Free
  • 10
    PhishBlock

    PhishBlock

    A program that detects and blocks phishing, pharming, Hacker's C&C.

    PhishBlock is a security program that detects and blocks Phishing, Pharming, Hacker’s C&C(Command and Control) Servers which are located in databases with URLs, DNS hostnames, and IP Addresses. This program detects and blocks Malware URLs, bad Hosts, and bad IP addresses. Recently, most malware codes are delivered covertly to users’ personal computers through Google ads, SNS, Blogs, BBS and so on, which users visit often. And After the malware codes connect the C&C server(or...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Stealth VM For Ubuntu & All Derivatives

    Stealth VM For Ubuntu & All Derivatives

    Run Windows XP & 7 Virus Free Inside Ubuntu & All Derivatives

    ...Indeed that is a problem you are looking to solve as quickly as possible. Stealth VM Software has solved your Windows to Linux migration dilemma already! You don't need to worry about viruses or malware infecting Windows & its data because Stealth VM Software invented by Robolinux keeps a protected clone of Windows and mirrors your data in a secure Ubuntu Linux partition.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Stealth VM For Linux Mint

    Stealth VM For Linux Mint

    Run Windows XP & 7 Virus Free Inside Linux Mint

    ...Indeed that is a problem you are looking to solve as quickly as possible. Stealth VM has solved your Windows to Linux migration dilemma already! You don't need to worry about viruses or malware infecting Windows & its data because the Stealth VM Software invented by Robolinux keeps a protected clone of Windows and mirrors your data in a secure Linux Mint partition.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    ...Hard disk with one of the following file systems; NTFS/FAT/EXT2/EXT3/EXT4. *This project is not production ready and still in development. Use at your own risk. I am not responsible for data loss. The LMSRT project itself is licensed under the creative commons license, Attribution-NonCommercial-ShareAlike 3.0 United States BY DOWNLOADING THIS APPLICATION YOU AGREE TO THE LICENSING OF EACH INDIVIDUAL ANTIVIRUS APPLICATION. THIS APPLICATION COMES WITH ABSOLUTELY NO WARRANTY ***I'm currently re-building the project using Debian live-build. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Migale eraser is a software permitting to erase safely any file or folder from your hard drive so that no recovery will be possible, even when using forensic tools.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    ShortcutVirusRemover

    ShortcutVirusRemover

    Remove shortcut virus and recover all damaged data.

    Shortcut Virus Remover is a data recovery tool that allows you to recover damaged data due to the Shortcut Virus. When you plug in your removable device to a shortcut virus infected computer, it destroys all the data on the plugged-in device. After a shortcut virus attack, your external storage drive will contain only shortcuts, and you will think your files and folders have been converted to shortcuts.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    Zendo Rescue

    A Lubuntu based ISO for antivirus, hdd issues, and password reset.

    A rescue live ISO built on Lubuntu and created with Remastersys and Unetbootin. It is intended to be installed on a USB flash drive to boot a computer for the purposes of virus removal, hard drive operations, and Windows password reset. Key programs included in the ISO are: AVG Free for Linux, ClamTK, Comodo Antivirus, Disk Utility, GParted, Boot Repair, Grub Customizer, CHNTPW, System Profiler And Benchmark, and Back In Time. As the ISO is simply a customized Lubuntu install, it is...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB