Showing 5 open source projects for "code copy"

View related business solutions
  • ConnectWise Cybersecurity Management for MSPs Icon
    ConnectWise Cybersecurity Management for MSPs

    Software and support solutions to protect your clients’ critical business assets

    ConnectWise SIEM (formerly Perch) offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see beyond your network traffic. Our team of threat analysts does all the tedium for you, eliminating the noise and sending only identified and verified treats to action on. Built with multi-tenancy, ConnectWise SIEM helps you keep clients safe with the best threat intel on the market.
    Learn More
  • Cloudflare secures and ensures the reliability of your external-facing resources such as websites, APIs, and applications. Icon
    It protects your internal resources such as behind-the-firewall applications, teams, and devices.
    Get Started
  • 1
    KodExplorer

    KodExplorer

    A web based file manager, web IDE / browser based code editor

    KodExplorer is a file manager for the web. It is also a web code editor, which allows you to develop websites directly within the web browser. You can run KodExplorer either online or locally, on Linux, Windows, or Mac-based platforms. The only requirement is to have PHP 5 available. Use experience like operating system, Rich context menu, and toolbar, drag, and drop, shortcut keys. All operations with files and folders on a remote server (copy, cut, paste, move, remove, upload, create folder...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 2
    JDiskCat

    JDiskCat

    Multi-platform disk cataloguing utility written in java.

    .... Cataloguing enables user to check what they contain without putting them physically into drive and avoid a possibility of a mechanical damage. Download package consists of a jar file and a Eclipse project with a full source code. No installation is required. You can copy this program anywhere or transfer it to another computer. Setting unique volume label to a drive before cataloguing is recommended. See blog or homepage for news and changelog. This program requires JRE 6 or newer.
    Downloads: 13 This Week
    Last Update:
    See Project
  • 3
    fileaxy

    fileaxy

    Fileaxy does file sync, de-duplication, image matching & bulk preview

    ... connections and will NOT request passwords. Fileaxy uses NO 3rd party libraries or code. Read/write wear to SSDs and mechanical drives is minimized where possible. Runs with Java 8+ [https://adoptopenjdk.net] on Mac, Windows, and Linux distros. My goal is to have Fileaxy manage 2 million available and unavailable files and their relationships live in the UI. This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. Copyright 2013-2022 by Stephen Baber
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Macast

    Macast

    A cross-platform application using mpv as DLNA Media Renderer

    A menu bar application using mpv as DLNA Media Renderer. You can push videos, pictures or music from your mobile phone to your computer. After opening this app, a small icon will appear in the menubar/taskbar/desktop panel, then you can push your media files from a local DLNA client to your computer.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Event Management Software Icon
    Event Management Software

    Ideal for conference and event planners, independent planners, associations, event management companies, non-profits, and more.

    YesEvents offers a comprehensive suite of services that spans the entire conference lifecycle and ensures every detail is executed with precision. Our commitment to exceptional customer service extends beyond conventional boundaries, consistently exceeding expectations and enriching both organizer and attendee experiences.
    Learn More
  • 5
    Hash Codes
    Program can hash data from keyboard, file or CD/DVD by Adler32, CRC32, CRC64, GOST, HAVAL, MD2, MD4, MD5, MD6, SHA-0, SHA-1, SHA-1-IME, SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320, TIGER or Whirlpool algorithm.
    Downloads: 7 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next