Algorithms Software


Category Category

License License

Translations Translations

Programming Language Programming Language

Status Status

Audience Audience

User Interface User Interface

Algorithms Software

  • Get your Apps to customers 5x faster with RAD Studio. Get your Apps to customers 5x faster with RAD Studio. Icon
    Get your Apps to customers 5x faster with RAD Studio. Icon

    The easiest and most powerful cross platform development tool available on the market. Start a free trial today (no credit card needed).

    RAD StudioTM: Build cross-platform apps ridiculously FAST!
    • Delivering fast and powerful native applications for Windows, Linux, macOS, iOS, Android, cloud and IoT.
    • Rapidly design, build, and run applications optimized for native performance, from a single code base across all platforms.
    • Securely connect and embed any data, on any tier, in the Enterprise, or cloud.
  • Multi-vendor storage monitoring simplified Multi-vendor storage monitoring simplified Icon
    Multi-vendor storage monitoring simplified Icon

    Monitor your multi-vendor storage to help ensure your applications get the performance & capacity they need with SolarWinds® Storage Resource Monitor.

    SolarWinds Storage Resource Monitor (SRM) gives you multi-vendor storage performance monitoring and alerting to help ensure peak storage performance. Automated capacity planning helps you predict storage shortages, reclaim space, and prevent application outages. SRM integrates with other Orion® Platform products to provide end-to-end visibility into the application stack, and lets you easily troubleshoot performance issues from application to storage.
  • XOR encrypt v2.0 Icon

    XOR encrypt v2.0

    Encrypt Your Text documents with XOR encryption

    This software provides an easy graphical way to encrypt your text documents from source code , text files ,scripts even jpeg files .It is a enhanced version of my earlier project which used win32 GUI . This is a demonstration of working of XOR encryption which was used by Germans in World War II ( . Besides from XOR'ing the message with password after every encryption the key changes pseudorandomly. The password you provide is hashed ( SHA256 ) and saved into the encrypted file to check if the password provided is correct.This algorithm has limitations in general more the numbers of relative characters in the password to plaintext more secure will be the encryption. XOR encrypt has a 3.5 of 5 editors rating from softpedia

    Downloads: 23 This Week Last Update: See Project
  • Previous
  • You're on page 1
  • Next

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you