Showing 6 open source projects for "social media mining"

View related business solutions
  • Our Free Plans just got better! | Auth0 by Okta Icon
    Our Free Plans just got better! | Auth0 by Okta

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
    Try free now
  • Bright Data - All in One Platform for Proxies and Web Scraping Icon
    Bright Data - All in One Platform for Proxies and Web Scraping

    Say goodbye to blocks, restrictions, and CAPTCHAs

    Bright Data offers the highest quality proxies with automated session management, IP rotation, and advanced web unlocking technology. Enjoy reliable, fast performance with easy integration, a user-friendly dashboard, and enterprise-grade scaling. Powered by ethically-sourced residential IPs for seamless web scraping.
    Get Started
  • 1
    internet-control

    internet-control

    Control how long your childs computer is connected to the internet

    internet-control is a very special implementation of parental control. It allows the child to be productive at the computer while lowering the danger of addiction to a minimum. Instead of restricting the time the computer may be used, it allows parents to restrict the time the computer may be connected to the internet. This way the child is still able to do its homework at the computer, but the danger of addiction to a game or social media application is minimised - the unpredictabillity...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Snare Lite (SIEM & Logging Software)

    Snare Lite (SIEM & Logging Software)

    Snare Enterprise: bit.ly/Snare-Trial

    ... architecture regardless of third party developers. In fact, the agnostic nature allows it to bridge gaps between multiple SIEM implementations across business units. For more on use cases, check out the Intersect Alliance website. https://www.snaresolutions.com/ Snare Enterprise’s premium features include: - Regulatory Compliance - TLS Encryption - Log Simulcasting - TCP – Guaranteed Log Delivery - USB Device Monitoring - And more! For updates follow us on social media!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Arkanoid - Break the Bricks Game

    Arkanoid - Break the Bricks Game

    It is a Brick breaking game with lots of cool features.

    Welcome to Arkanoid - Break the Bricks v1.0.0.4 This game is a cross-platform, arcade game inspired by one of the most popular game of old time, The Arkanoid. This game is an approach to create a brick breaking game with more unique features and some new challenges with new cool look. Download and play this game and let me know how was the game. And don't forget to rate and review my project. # If you want to see some more cool features in the next version of this game, you can...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    AEBL

    AEBL

    AEBL is a mobile media distribution system

    AEBL Mobile Media Player, changing how we consume media. AEBL is a media player and a digital media platform in use in the IHDN XPO network media system ( http://www.ihdn.ca/Xpo_VI.html ). AEBL is foremost a mobile media distribution and playback framework. It was created to be the core technology that is used in a television ad insertion and digital sign, and further development has opened up many more applications. It currently is designed to run on a raspberry Pi, although it is being...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5
    VCipher

    VCipher

    A Social Media Encryption/Decryption Tool

    VCipher is a unique encryption and decryption tool.The code is not unique rather it is quite simple as it uses Vigenère cipher algorithm but the idea is quite unique.It is created to be used as an extra layer of protection for social networking sites,so even if someone's account is hacked it will take them so expertise to read those messages.And if used correctly it can also be made uncrackable if used correctly.This is a CLI(Command Line Interface) there is a web version too. VCipher Web...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    A loose collection of source code and libraries for mining and recovering data from all manner of obscure file formats and media
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next