Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Download Now
Business Automation Software for SMBs
Fed up with not having the time, money and resources to grow your business?
The only software you need to increase cash flow, optimize resource utilization, and take control of your assets and inventory.
Welcome to Data Access Layer for Java (DAL4j) a set of command line tools and framework used to reverse engineer a MySQL or SQLServer database schema into a set of JPA Entity Beans.
DAL4j can be useful for scenarios where there is an existing database schema but a technology other that JPA is used to interact with the database. DAL4j can provide an easy way to migrate your code base from other technologies such as JDBC or Hibernate to JPA.
The beans generated can be 1 or two types:...
VAN sources private-party vehicles from over 20 platforms and provides all necessary tools to communicate with sellers and manage opportunities. Franchise and Independent dealers can boost their buy center strategies with our advanced tools and an experienced Acquisition Coaching™ team dedicated to your success.
HcryptoJ (Historical cryptology in Java) is a Java based programming library for implementing and analyzing historical ciphers. HcryptoJ is designed to support research and teaching in historical cryptography and computer science. Licensed under GPL.
A simple encrypter. Uses various encryption algorithms including but not limited to: AES, Twofish, RC4 and IDEA. To enable the stronger encryption standards such as AES the user must have installed the unlimited strength jurisdiction policy files.
Crypterz is our first program that is not in its beta stages. This program will encrypt and decrypt programs with Password support. ~~~FIXED Windows 7 CRASHING BUG~~~
Simple tool for file encryption and folder content encryption with AES 256. Files can also be hashed with a SHA1 signature. A command line version is available as well as a GUI version. One other useful feature is to encrypt messages for emails.
Amnesia is a design-rich 'host-proof' web application that encrypts and remembers all sorts of personal information from passwords to private notes. Project now hosted at Google Code: https://code.google.com/p/amnesia-app/
OrangeHRM provides a world-class HRIS experience and offers everything you and your team need to be that HR hero you know that you are.
Give your HR team the tools they need to streamline administrative tasks, support employees, and make informed decisions with the OrangeHRM free and open source HR software.
A one stop solution for all your cryptology needs such as ENCRYPTION, DECRYPTION, STEGANOGRAPHY, PASSWORD GENERATOR, PASSWORD KEEPER, HASH CALCULATOR etc.
This is a more secure file encryption program which uses SERPENT cipher and WHIRLPOOL+SHA-256 hash functions in key creation and for integrity checking.
Cryptic is a cryptographic applications suite for encryption/decryption of data, calculating cryptographic hashes or message digests and securing user passwords using a master password in a password safe.
Encryption and Decryption Software that allow you to type your own password or Key for "All Types of Files" (gif, jpg, doc, xls, txt, tif, etc..etc..etc..)
DCrypt is an encryption and decryption tool that combines in a smart way multiple algorithms. The combination of multiple strong algorithms makes it much more difficult for hackers to get the plain content of the encrypted file without the password.
SLEncrypt is a python module for encryption with 11 ciphers at the moment, including ADFGVX, Autokey, Caesar/ROT13, Vigenere, XOR and a lot more. It contains functions allowing you to easily encrypt/decrypt files. The code is about 95% PEP 8 compilant.
A hook script usable with TortoiseSVN (and possible other subversion clients/GUIs) providing transparent repository encryption (encryption/decryption at the client side).
An encryption/decryption engine which can encrypt any file(text, pdf , doc, rtf , gpg , mp3 , mp4 etc..) or any data on your PC such that only you with the valid password can decrypt it.Also it will compress the file while encrypting it.
DNAOnline is a web front-end to the DNA® (Distributed Network Attack®) decryption software from AccessData Corporation. It was developed by the E-Crime Investigative Technologies Lab at FSU and supported in part by NIJ grant 2005-DE-BX-K034.
Cryptomni is a program which can encrypt and decrypt files using the one-time pad cipher. If a key is truly random, kept secret, and never reused, this encryption algorithm can be proven to be unbreakable.
The Moonbounce API is a set of high level objects that encapsulate pieces of the Bouncycastle lightweight crypto API. Moonbounce significantly simplifies RSA key generation, signing, encryption/decryption and verification of both byte arrays and files.
Flash/PHP adaptation of the XTEA encryption algorithm. Allows encryption/decryption of sensitive data using 128-bit key. May be used for network data (HTTP) or offline for implementations like secure CD-ROM projects.
Demise Data File Encrypter/Decrypter. Apply encryption/decryption to Demise Data Files via interactive interface or right click in Windows Explorer. (Braindead Edit: sorry guys I have temporarily removed the downloads upon request)