With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Your top-rated shield against malware and online scams | Avast Free Antivirus
Browse and email in peace, supported by clever AI
Our antivirus software scans for security and performance issues and helps you to fix them instantly. It also protects you in real time by analyzing unknown files before they reach your desktop PC or laptop — all for free.
This file integrity checker uses Alternate Data Streams to store the hashes of your files. So, it only works on NTFS volumes.
With that, you can rename, copy or move your files (to another NTFS volume) without losing the hashes, and without needing to do anything else.
The Whirlpool algorithm is a strong 512-bit hash function. This tool uses several optimized implementations with SSE4.1 or SSE2 instructions when available.
Each folder is recursively processed. You can use drag-and-drop...
Genetic Algorithm File Fitter, GAFFitter for short, is a tool based on a genetic algorithm (GA) that tries to fit a collection of items, such as files/directories, into as few as possible volumes of a specific size (e.g. CDs or DVDs).
NO LONGER MAINTAINED, NO LONGER SUPPORTED
Manifest Maker is a graphical Python application which takes a file or group of files and creates a plain text manifest list of each item. The manifest includes the file name (including directory structure) as well as a checksum of the file.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
It's a open source file wiper program which can get commands remotely and acts in emergency stiuations. Program's name inspired by Iron Man 3 movie where Tony Stark activates the "House Party Protocol" when his house is destroyed. It's written for preventing your private datas captured by police or thieves.
*Usage*
- You need to have a hosting account which can run php scripts (you can register for a free one)
Change the $password section in base.php and upload it to your hosting with...
Duplicate Files Finder is a cross-platform application for finding and removing duplicate files by deleting, creating hardlinks or creating symbolic links. A special algorithm minimizes the amount of data read from disk, so the program is very fast.
GUI based lightweight duplicate file finder / remover.
Simple GUI based lightweight duplicate file finder and remover. Configurable file search and preview (via external tools) option for file data. No command-line interface available!
This is basically a reimplementation of dupfinder as: it doesn't compile on my computer, the executable won't work either, the projects seems dead and I didn't wanna work through the original code. So Look'n'Feel should be somewhat the same, though some changes have been made.
Algorithm is simple and suitable...
--- I've removed the setup exe because it pulls the app down from a site which is no longer on-line. Once I've refactored it for local distribution I'll put it back. In the meantime you can build the app yourself from the project files if you are so inclined ---
The Media Library Sync is a tool designed for syncing a large media library from a master source to multiple destinations. It allows you to specify which parts of the library you want to sync on which devices.
Fastly's edge cloud platform delivers faster, safer, and more scalable sites and apps to customers.
Ensure your websites, applications and services can effortlessly handle the demands of your users with Fastly. Fastly’s portfolio is designed to be highly performant, personalized and secure while seamlessly scaling to support your growth.
Fleuron is a silent flash drive copier. When a flash drive is connected, Fleuron automatically starts copying the data with a Breadth First Search algorithm. In this way, the root directories are copied first and as time passes, deeper directories are copied. Fleuron also randomly stops for random amounts of seconds to allow the drive to be safely removed and to avoid detection. Fleuron can be used for data backup, flash synchronization and undetectable data copying.
Note: Currently Fleuron...
Program can hash data from keyboard, file or CD/DVD by Adler32, CRC32, CRC64, GOST, HAVAL, MD2, MD4, MD5, MD6, SHA-0, SHA-1, SHA-1-IME, SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320, TIGER or Whirlpool algorithm.
The project will develop an in – memory object cache utilizing the LRU (least-recently-used) algorithm. The cache will store the objects that are most accessed within a fixed size memory pool. Thus system is keep statistics and calculates tradeoffs.
Package for coding and decoding files with Matheos algorithm from commandline or console in Linux/Unix Environment. Based on Keys stored in files or as hardware locks (on devices). Fast and strong coding. Fast encoding.ONLY BINARY PACKAGES FOR NOW!