pgBackRest aims to be a reliable, easy-to-use backup and restore solution that can seamlessly scale up to the largest databases and workloads by utilizing algorithms that are optimized for database-specific requirements. Compression is usually the bottleneck during backup operations but, even with now-ubiquitous multi-core servers, most database backup solutions are still single-process. pgBackRest solves the compression bottleneck with parallel processing. Utilizing multiple cores for...
Use of Michael Rabin's Information Dispersal Algorithm to provide secure, dispersed storage in a networked environment. For full download, please get both Math-FastGF2 and Crypt-IDA releases under the files link. See project wiki for more information.
This is a more secure file encryption program which uses SERPENT cipher and WHIRLPOOL+SHA-256 hash functions in key creation and for integrity checking.
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
Stores and retrieves files in an encrypted archive. Also manages files stored on CDs and DVDs. Other functions are incomplete. PLEASE NOTE: you need to download both an Objectify release and a Public Objects release.
TclTrf is an extension library to the script language tcl, as created by John Ousterhout. It extends the language at the C-and Tcl-with ``transformer''-commands to encode and compress data.
Based on the stacked channels of the tcl core (ability inter
Open Legacy Storage Document: Generic Document Archiving on Disk and Network(using MINA) Framework in Java for huge number of docs(up to 2^192 documents), efficient(Java NIO), crypto, net transfert, web retrieve, J2EE and eMail archiving compatible.
This is a very powerfull criptography project that basicaly can be used to transmit or store secure data and study some cipher, hash and compression algorithms to understands how it works.
isosteg use the steganography to insert or extract data into any iso9660 filesystem image without damage the legacy data. Is usefull to test if a burned iso9660 cd-rom contain steganographied data.
An original bruteforce-based encryption/decryption system. BBE was originally conceived to chat with encrypted text on IRC. mIRC and X-Chat support BBE via script addon. BBE can also encrypt MIME encoded files. Blowfish encryption is currently supported.
Disk Optimizer selects files to be placed on any disk medium that will maximize the space used. It is very efficient in finding an optimum file set since it uses a Genetic Algorithm instead of brute force.
NoFault is a library written in C used to encrypt or decrypt data with XOR encryption. KNoFault, NoFault32 and CLNoFault are direct applications of the library, which is easy to use in your own programs.
OceanStore is an architecture for a global-scale file system which uses erasure coding, cryptography, and Byzantine agreement to provide available, highly durable storage in a peer-to-peer environment.
ReHash is an easy-to-use console-based hash calculation tool written in C++. It supports many algorithms and output formats and it can be fully configured using some of the many command-line arguments which can be passed to the tool.
Hardware-ID is a small Linux module providing
a program by program assignment of certain hardware
specific values. Useful for preparing master
hard drives, hardware independend backup/restore
and some exotic hardware.
Licen is a multi platform permission backup tool. Permissions can be backed and restored up from hole networks as well as single workstations. Hence permissions have a big impact on computer security we are focusing on writing a very secure product.
Lrzip is a lossless compression application designed to scale with modern hardware resources using a variety of different back end compression algorithms with the ability to have unlimited size compression windows and optional high grade encryption. The larger the file the better the compression possible and the more powerful the hardware the faster it can compress with a heavily multithreaded design.