Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
Learn More
Find Hidden Risks in Windows Task Scheduler
Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.
Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
Tiny application which allows encrypting basic text.
...I think it is a very strong way to encrypt, specially if the text has more than 1 KB.
The application reads encrypted bytes from disk, and writes encyrpted bytes to disk, so it never is saved in the hard disk decrypted.
JDK-17 compatibility
...It is based in the XOR symetric encryption combined with a pseudorandom resorting of the bytes.
Strenth and time to encrypt/decyrpt per MB adapted to size of input file.
Multithread.
zoom
Multilanguage
Dark mode
JDK-17 compatibility
It includes detailed documentation in English, Spanish and Catalan.
PCSecrets is a PC application that holds secret text data - protected by a master password and strong encryption. Use it as a password manager or just somewhere to hold any text data securely in one place. It can hold a second, hidden set of secrets that is undetectable and plausibly deniable.
The program is also a PC counterpart of the Secrets for Android app. It uses the same data structure and provides synchronization that allows easy transfer of secrets between the two. For those who...
Java library with Cryptographic algorithms.
Easy to use Crypto algorithms. Works on Windows, Linux, Android.
No external lib dependencies, no useless abstractions, no 'crypto provider'.
Elliptic curves was borrowed from BouncyCastle and simplified a lot.
Most of EC classes are custom algorithms for certain curves. Can be easily deleted if u dont need them.
With couple of classes u can parse and construct those ugly ASN.1 structures, look at RSA and EC key formats for example.
...
Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.
Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
The best cryptography playground available Demo @
https://8gwifi.org
How to Install
wget https://downloads.sourceforge.net/project/cryptography-playgroud/crypto-installer.tar
tar xvf crypto-installer.tar;cd crypto-installer
./bootstart.sh
Browse http://localhost:8080
Lecithine is a FUSE (file system in user space) using a secret sharing scheme.
You can use Lecithine as regular file system.
When writing to disk, data will be devided into randomly chosen pieces (secret shares) and stored into different places. Upon reading, the shares are merged together such that in turn the plaintext results.
From a cryptographers point of view, there is no symmetric or private key ever needed to produce a ciphertext. This is how secret sharing schemes are designed.
silvertunnel.org is a project that provides an end-user browser, a Java library and additional Java security tools to easily access anonymity networks such as the Tor (torproject.org) network. Secure and easy to use. Tor4Java and Tor Browser.
Attention: see project status on page https://sourceforge.net/p/silvertunnel/discussion/962278/thread/83dc2d02/#
A kind of encryption named "simple stream encrypt". The length of plaintext segment or the length of key is not limited, but must greater than zero. The lengths of every plaintext segment in a process don't require equivalency.
.../Exp. ASCII, XML, SQL,
PS, Tex/LaTex, RTF
GUI: X-Windows, MS-Windows
Interface to C++, DBs, Perl,
PHP, Java, TCP/IP
LISP-like interpreter
written in C++ using C-LIB