Your unified business intelligence platform. Self-service. Governed. Embedded.
Chat with your business data with Looker. More than just a modern business intelligence platform, you can turn to Looker for self-service or governed BI, build your own custom applications with trusted metrics, or even bring Looker modeling to your existing BI environment.
Build a foundation for data security and disaster recovery to fit your clients’ needs no matter the budget.
Whether natural disaster, cyberattack, or plain-old human error, data can disappear in the blink of an eye. ConnectWise BCDR (formerly Recover) delivers reliable and secure backup and disaster recovery backed by powerful automation and a 24/7 NOC to get your clients back to work in minutes, not days.
FTC cascades choice of Aria-256, AES-256, Camellia-256, SM4, or ChaCha20 for file encryption, and AES-256, TripleDES, and Blowfish for text encryption, both receive robust keystream generation
File hashing tool using Adler32, CRC32, MD5, SHA1, SHA256, SHA512
Most file hashing utils involve specifying a file in a dialog, or dragging a file to an input box, SDigest simply resides in the file context menu, and will display a pop-up showing Adler32, CRC32, MD5, SHA1, SHA256, and SHA512 message digests of the selected file
Encryption engine supports AES, Aria, Camellia, SM4, and ChaCha20
Basic symmetric encryption engine, meant to be called from a script, so be used as a command line encryption tool as well.
https://codeberg.org/BloodFeastMan/arca