Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.
Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
Download Free Tool
Retool your internal operations
Generate secure, production-grade apps that connect to your business data. Not just prototypes, but tools your team can actually deploy.
Build internal software that meets enterprise security standards without waiting on engineering resources. Retool connects to your databases, APIs, and data sources while maintaining the permissions and controls you need. Create custom dashboards, admin tools, and workflows from natural language prompts—all deployed in your cloud with security baked in. Stop duct-taping operations together, start building in Retool.
Tiny application which allows encrypting basic text.
...I think it is a very strong way to encrypt, specially if the text has more than 1 KB.
The application reads encrypted bytes from disk, and writes encyrpted bytes to disk, so it never is saved in the hard disk decrypted.
JDK-17 compatibility
...It is based in the XOR symetric encryption combined with a pseudorandom resorting of the bytes.
Strenth and time to encrypt/decyrpt per MB adapted to size of input file.
Multithread.
zoom
Multilanguage
Dark mode
JDK-17 compatibility
It includes detailed documentation in English, Spanish and Catalan.
PCSecrets is a PC application that holds secret text data - protected by a master password and strong encryption. Use it as a password manager or just somewhere to hold any text data securely in one place. It can hold a second, hidden set of secrets that is undetectable and plausibly deniable.
The program is also a PC counterpart of the Secrets for Android app. It uses the same data structure and provides synchronization that allows easy transfer of secrets between the two. For those who...
Java library with Cryptographic algorithms.
Easy to use Crypto algorithms. Works on Windows, Linux, Android.
No external lib dependencies, no useless abstractions, no 'crypto provider'.
Elliptic curves was borrowed from BouncyCastle and simplified a lot.
Most of EC classes are custom algorithms for certain curves. Can be easily deleted if u dont need them.
With couple of classes u can parse and construct those ugly ASN.1 structures, look at RSA and EC key formats for example.
...
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
The best cryptography playground available Demo @
https://8gwifi.org
How to Install
wget https://downloads.sourceforge.net/project/cryptography-playgroud/crypto-installer.tar
tar xvf crypto-installer.tar;cd crypto-installer
./bootstart.sh
Browse http://localhost:8080
Lecithine is a FUSE (file system in user space) using a secret sharing scheme.
You can use Lecithine as regular file system.
When writing to disk, data will be devided into randomly chosen pieces (secret shares) and stored into different places. Upon reading, the shares are merged together such that in turn the plaintext results.
From a cryptographers point of view, there is no symmetric or private key ever needed to produce a ciphertext. This is how secret sharing schemes are designed.
silvertunnel.org is a project that provides an end-user browser, a Java library and additional Java security tools to easily access anonymity networks such as the Tor (torproject.org) network. Secure and easy to use. Tor4Java and Tor Browser.
Attention: see project status on page https://sourceforge.net/p/silvertunnel/discussion/962278/thread/83dc2d02/#
Total Network Visibility for Network Engineers and IT Managers
Network monitoring and troubleshooting is hard. TotalView makes it easy.
This means every device on your network, and every interface on every device is automatically analyzed for performance, errors, QoS, and configuration.
A kind of encryption named "simple stream encrypt". The length of plaintext segment or the length of key is not limited, but must greater than zero. The lengths of every plaintext segment in a process don't require equivalency.
.../Exp. ASCII, XML, SQL,
PS, Tex/LaTex, RTF
GUI: X-Windows, MS-Windows
Interface to C++, DBs, Perl,
PHP, Java, TCP/IP
LISP-like interpreter
written in C++ using C-LIB