Showing 12 open source projects for "garnet-file"

View related business solutions
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • Smart Business Texting that Generates Pipeline Icon
    Smart Business Texting that Generates Pipeline

    Create and convert pipeline at scale through industry leading SMS campaigns, automation, and conversation management.

    TextUs is the leading text messaging service provider for businesses that want to engage in real-time conversations with customers, leads, employees and candidates. Text messaging is one of the most engaging ways to communicate with customers, candidates, employees and leads. 1:1, two-way messaging encourages response and engagement. Text messages help teams get 10x the response rate over phone and email. Business text messaging has become a more viable form of communication than traditional mediums. The TextUs user experience is intentionally designed to resemble the familiar SMS inbox, allowing users to easily manage contacts, conversations, and campaigns. Work right from your desktop with the TextUs web app or use the Chrome extension alongside your ATS or CRM. Leverage the mobile app for on-the-go sending and responding.
    Learn More
  • 1

    badpi-cyphering

    file/stream encryption/decryption/CRC based on PI compute algorithm

    Encryption/decryption/CRC algorithm base on PI calculation. The private Key is composed of : - a starting position nb (iterations before starting encrypt) - a loop nb (in-between iteration) - small spot nb for the position in floating number part Challenge is proposed in my website.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    cppcrypto

    C++ cryptographic library (modern hash functions, ciphers, KDFs)

    ...MAC functions: HMAC, Poly1305. Key derivation functions: PBKDF2, scrypt, Argon2, HKDF. Includes sample command-line tools: - 'digest' - for calculating and verifying file checksum(s) using any of the supported hash algorithms (similar to md5sum or RHash). - 'cryptor' - for file encryption using Serpent-256 algorithm in AEAD mode. Check out the cppcrypto web site linked below for programming documentation.
    Leader badge
    Downloads: 3 This Week
    Last Update:
    See Project
  • 3
    JDS: Data Security

    JDS: Data Security

    JDS is a powerful data protection program

    ...Documents are encrypted using a special algorithm. The data encryption algorithm is constantly updated to improve security. The program also provides other functions. Such as sending a file to a vault with password access, fast text encryption in 3 types, and much more. The program is easy to use and does not require special knowledge. The standard version has 2 languages (Russian and English) and 9 themes. You can download the language and theme pack separately.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    NCrypted

    NCrypted - simple file encryption software with GPU support

    NCrypted is a simple file encryption software. It is implemented on top of AES 128-bit algorithm. This software was designed to be as simple as possible, so you won't find any fancy, flashy gui elements or complicated advanced options. You can also use it directly from command line. NCrypted can automatically detect and take advantage of your NVidia graphics card to speed up the file processing.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Manage your fitness club more efficiently and keep your members engaged Icon
    Manage your fitness club more efficiently and keep your members engaged

    Gym managers and businesses in search of a gym management solution to handle all their fitness management needs and requirements

    An all-in-one cloud-based management solution for a variety of health and fitness centers, Shapenet delivers a full suite of integrated technology solutions.
    Learn More
  • 5
    XOR encrypt v2.0

    XOR encrypt v2.0

    Encrypt Your Text documents with XOR encryption

    ...Besides from XOR'ing the message with password after every encryption the key changes pseudorandomly. The password you provide is hashed ( SHA256 ) and saved into the encrypted file to check if the password provided is correct.This algorithm has limitations in general more the numbers of relative characters in the password to plaintext more secure will be the encryption. XOR encrypt has a 3.5 of 5 editors rating from softpedia http://www.softpedia.com/get/Security/Encrypting/XOR-Encrypt.shtml
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Rcrypto

    Rcrypto

    Encryption Tool

    Rcrypto is the encryption and decryption software for windows XP,vista and 7 to keep your data secure from unauthorized users. It uses the highly secure algorithm to encrypt every byte of the file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    ENIGMA 2000

    ENIGMA 2000 is a reliable file encrypter for DOS shell

    ENIGMA 2000 is a symmetric cryptographic algorithm developed in C++ for Windows, to encrypt any file. It is not optimized for speed processing but it is extremly reliable. Tests state that a huge input file just with zeros, will return an output file whose frequency analysis is white noise. It uses six phases to encrypt any file and the phases sequence depends on the password. On phase 5, it uses the Rubik's cube paradigm to encrypt the data. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Vijner 974 E-Sys (2048 bits and unlimited encryption). Enables easy (un-)encryption from text input or .txt file, and to (un-)encrypt raw files, with Vigenère Algorithm + unlimited encryption keys. Simple and powerful. Adapt to fit your needs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    The algorithm allows any kind of weights (costs, frequencies), including non-numerical ones. The {0, 1, ..., n-1} alphabet is used to encode message. Built tree is n-ary one.The algorithm is based on a set of template classes : Cell(SYMBOL, WEIGHT), Node(
    Downloads: 0 This Week
    Last Update:
    See Project
  • R3 Contract Management for GovCon Icon
    R3 Contract Management for GovCon

    Designed to meet the unique needs of Federal Government Contractors.

    R3 Contract Management for GovCon is a practical, flexible, and affordable software solution designed specifically for small to mid-size Federal Government Contractors. It provides you with a centralized contract management system. This gives you greater control over your contracts, reduces risks, increases your effectiveness and provides you with cost savings from increased productivity.
    Learn More
  • 10
    Rijndog is an easy to use file encryption/decryption package making use of the Rijndael AES algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    KCrypto is a KDE2 file encryptor. It uses the Rijndael ( block cipher algorithm AES winner ) public domain c++ class implementation written by Szymon Stefanek , and it is capable of encrypting and decrypting every kind of file ( text and binary ) i
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    BP-Tools

    BP-Tools

    Set of useful tools for payment service development

    The BP-Tools set consist from applications supporting EFT testing, benchmarking and transaction service development. BP-Tools suite currently consists of following three components: - BP-CCALC: Cryptographic Calculator - BP-CardEdit: Thales P3 Input/Output file editor - BP-EMVT: EMV Tool - BP-HCMD: Thales HSM Commander
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next