Algorithms Software

OS OS

  • More...

Category Category

License License

Translations Translations

Programming Language Programming Language

Status Status

Audience Audience

User Interface User Interface

Algorithms Software

  • 2018 Network Intelligence Planning Guide 2018 Network Intelligence Planning Guide Icon
    2018 Network Intelligence Planning Guide Icon

    Get insights on net neutrality, cloud readiness, security and WAN transformation.

    Networking is becoming cloudier, hybrid and more Internet-centric. IT managers now own user experience, whether they own the networks or not. Get our latest ebook to learn how network intelligence will help you adapt to a quickly changing Internet-centric environment.
    Are you involved with your company's network performance/operations team?
    Get Ebook
  • Discover server and application network dependencies Discover server and application network dependencies Icon
    Discover server and application network dependencies Icon

    Discover and troubleshoot application dependencies to determine if it’s an application or network problem with SolarWinds Server & Application Monitor

    Server & Application Monitor helps you discover application dependencies to help identify relationships between application servers. Drill into those connections to view the associated network performance such as latency and packet loss, and application process resource utilization metrics such as CPU and memory usage. Determine if process utilization or network performance is affecting the application and end-user performance.
  • OW.NET

    OW.NET -- 1-Wire API port from Java (and J#) to C#. Use the Dallas 1-Wire and iButton chips with standard C# using a serial adapter (also CF.net) or the TMEX drivers on the Windows platform. No J# distribution installation required.

  • Vigenere Dictionary Attack

    Vigenere brute force / dictionary cracking tool

    This is a tool that uses a combination between a brute force and dictionary attack on a Vigenere cipher. At present, keys are generated using brute force (will soon try passwords generated from a dictionary first). Each key is then used to decode the encoded message input. The output is analysed and then put into a ranking table. Outputs will be ranked on a variety of factors (at present, only number of dictionary words in output are counted). For the future: Better key generation, trying combinations of dictionary words with numbers. If that fails, brute force will be used. For all attempts of the dictionary attack, only keys within the known key length range will be generated. Better ranking system and analysis of possible decoded messages. Note: The version currently released, I made in an evening! It is nowhere near ready for release but is a fun project to think about and I need more ideas for improvements mentioned above. Discuss possible solutions and ideas!

    Downloads: 12 This Week Last Update: See Project
  • Previous
  • You're on page 1
  • Next

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you