Showing 9 open source projects for "win32-setup.exe"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1

    SATURN cipher

    RNG for use in a stream cipher

    SATURN is now a fully-functional stream cipher. It is in active development. The underlying algorithm is SATURNrng, a cryptographically-secure random number generator. SATURNrng is seeded with a 480-bit key and a 480-bit nonce which then produces a random stream used to encrypt a plaintext.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    XOR encrypt v2.0

    XOR encrypt v2.0

    Encrypt Your Text documents with XOR encryption

    This software provides an easy graphical way to encrypt your text documents from source code , text files ,scripts even jpeg files .It is a enhanced version of my earlier project https://sourceforge.net/p/xorencrypt which used win32 GUI . This is a demonstration of working of XOR encryption which was used by Germans in World War II (http://en.wikipedia.org/wiki/Lorenz_cipher) . Besides from XOR'ing the message with password after every encryption the key changes pseudorandomly. The password you provide is hashed ( SHA256 ) and saved into the encrypted file to check if the password provided is correct.This algorithm has limitations in general more the numbers of relative characters in the password to plaintext more secure will be the encryption. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    CrackThis!

    CrackThis!

    Data Encrypton Software utilizing IMPACT

    We developed a classic solution that reflects the very nature of quantum mechanics in whole, ultimately demonstrating the raw power of numbers. We developed a truly irreversible one way algorithm which, when applied to information, both encrypts and decrypts it. That is to say that the algorithm which encrypts the information works in the same direction as the algorithm that decrypts it. This in itself is the very nature of quantum mechanics - "forward only". Through a...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    EZ Encryption
    This simple encryption program, allows you to virtually encrypt all documents and even decrypt them back using the secure XOR encryption algorithm. This program is designed for beginners who know little about encryption.
    Downloads: 2 This Week
    Last Update:
    See Project
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • 5
    Cypher is an encryption program that uses the AES (Rijndael) algorithm to encrypt and decrypt files. You can use Cypher to protect sensitive data from unwanted access.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    Szyfrator is a GUI application for Windows XP/Vista/7. It encrypts and decrypts text messages using the public RSA algorithm. It generates two 256 bit keys: public and private and was designed to be very easy to use.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    It is a fine tool to encrypt your data.It uses a dinamic algorithm and a nice interface.It`s easy to use and helpful.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    The Tiny Encryption Algorithm (TEA) was developed by David Wheeler and Roger Needham at the Computer Laboratory of Cambridge University. The variant used was developed by David Wagner. TEACrypt 80x86 is the porting of this algorithm to the 80x86 platform
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    TextCodec can encode texts using simple algorithm and then decode them by using statistical language data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB