Showing 2 open source projects for "arduino source code"

View related business solutions
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • The first and only enterprise browser that solves both enterprise security and workforce productivity Icon
    The first and only enterprise browser that solves both enterprise security and workforce productivity

    A browser purpose-built for work: one that simultaneously supercharges enterprise security, workforce productivity and enterprise AI.

    Traditional browsers were never designed for work. They're for internet browsing. Imagine a browser purpose-built for work: one that simultaneously supercharges enterprise security, workforce productivity and enterprise AI.
    Learn More
  • 1
    GOST-Shred ☭

    GOST-Shred ☭

    Cross-platform Shred implementation written in Golang

    Commandline File Shredder - ALBANESE Lab (c) 2020-2021 GOST R 50739-95 Data Sanitization Method (2 passes). Prevents data recovery using standard recovery tools. Copyright © 2020-2021 ALBANESE Research Lab Source code: https://github.com/pedroalbanese/gost-shred Visit: http://albanese.atwebpages.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    [C#] Secure Shredder Console

    A console file shredder that supports many algorithms.

    ...The program supports Zero Data 1 Pass, British HMG IS5-Baseline 1 Pass, Russian GOST P50739-95 2 Passes, British HMG IS5-Enhanced 3 Passes, US DoD 5220.22-M / Canadian RCMP DSX 3 Passes, German VSITR 7 Passes, Bruce Schneier's 7 Passes, Canadian RCMP TSSIT OPS-II 7 Passes, and Peter Gutmann 35 Passes. The program is written in C# .NET. The source code is also available for download and you may contribute to the development here. If you want a clear explanation on how each of the algorithms work, please refer here: http://www.phoebekwok.com/publications/GJY_SecureDataShredder.pdf
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next