Showing 7 open source projects for "user permissions"

View related business solutions
  • Bright Data - All in One Platform for Proxies and Web Scraping Icon
    Bright Data - All in One Platform for Proxies and Web Scraping

    Say goodbye to blocks, restrictions, and CAPTCHAs

    Bright Data offers the highest quality proxies with automated session management, IP rotation, and advanced web unlocking technology. Enjoy reliable, fast performance with easy integration, a user-friendly dashboard, and enterprise-grade scaling. Powered by ethically-sourced residential IPs for seamless web scraping.
    Get Started
  • The #1 Embedded Analytics Solution for SaaS Teams. Icon
    The #1 Embedded Analytics Solution for SaaS Teams.

    Qrvey saves engineering teams time and money with a turnkey multi-tenant solution connecting your data warehouse to your SaaS application.

    Qrvey’s comprehensive embedded analytics software enables you to design more customizable analytics experiences for your end users.
    Try Developer Playground
  • 1
    EncrypIT

    EncrypIT

    Program to quickly and easily encrypt or decrypt files or directories

    Program to quickly and easily encrypt or decrypt files or directories using Encrypting File System (EFS) as well as add and remove domain user EFS permissions to a file. There is also a button to view the info on an encrypted file as well as for backing up a users EFS PFX certificate.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2

    Weed Killer

    Aged File Removal

    ..., but exclusion patterns as well. - Multiple configurations per file. - Simple MDI GUI for editing and testing. - Configuration extension registered as a file type for opening directly from Windows Explorer. - Multiple configuration file editing, with copy/paste support. - Server restrictions on a configuration file, to limit what systems may execute the file when automated. - Automatic assignment/removal of delete permissions for an NT credential on a targeted root folder. Written in C#
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    Full Control Windows permissions

    Allows for you to gain ownership and permissions to files/folders.

    This program allows you to gain ownership and/or Full Acces control permissions for a file or folder, useful if you want to delete files or folders used by TrustedInstaller (SYSTEM) or get file's ownership from a user on the same system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    Symlink Creator

    Program to create symlinks. Provides the CMD command as well.

    Just a small application I made to simplify the process of creating symbolic and hard links in Windows 7 and Windows 8 (likely Vista too). It is a GUI for the MKLINK command in Windows, which makes creating the links much easier. The program requires administrator permissions due to use of the command prompt, so you should run it as an administrator if you experience any problems. Note: It is not possible to create a hard link from a network share. You must use a symbolic link instead...
    Leader badge
    Downloads: 164 This Week
    Last Update:
    See Project
  • Free CRM Software With Something for Everyone Icon
    Free CRM Software With Something for Everyone

    216,000+ customers in over 135 countries grow their businesses with HubSpot

    Think CRM software is just about contact management? Think again. HubSpot CRM has free tools for everyone on your team, and it’s 100% free. Here’s how our free CRM solution makes your job easier.
    Get free CRM
  • 5
    SetACL: manage permissions (ACLs) on Windows systems from the command line or your programs/scripts. Supports all options available in Explorer, and more.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 6
    JIIC is a streaming-based Java implementation of ISO 9660 for creating CD-ROM filesystem images
    Downloads: 4 This Week
    Last Update:
    See Project
  • 7
    Emulate filesystem security on Windows 9x systems with FAT16/32 filesystems. Files, directories, and drives can be assigned read/write/execute permissions which are enforced by a kernel-mode driver. Configuration file is locked while the driver is loaded
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next