Showing 10 open source projects for "security"

View related business solutions
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • Smart Business Texting that Generates Pipeline Icon
    Smart Business Texting that Generates Pipeline

    Create and convert pipeline at scale through industry leading SMS campaigns, automation, and conversation management.

    TextUs is the leading text messaging service provider for businesses that want to engage in real-time conversations with customers, leads, employees and candidates. Text messaging is one of the most engaging ways to communicate with customers, candidates, employees and leads. 1:1, two-way messaging encourages response and engagement. Text messages help teams get 10x the response rate over phone and email. Business text messaging has become a more viable form of communication than traditional mediums. The TextUs user experience is intentionally designed to resemble the familiar SMS inbox, allowing users to easily manage contacts, conversations, and campaigns. Work right from your desktop with the TextUs web app or use the Chrome extension alongside your ATS or CRM. Leverage the mobile app for on-the-go sending and responding.
    Learn More
  • 1
    VoIP Honey project provides a set of tools for building an entire honeynet, thus includes honeywall and honeypot emulating VoIP environments such as Asterisk PBX or OpenSer with fully configurable connections. Voip Honey runs on GNU/Linux and Windows Systems. It can be compiled for Mac OSX as well.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    XOR encrypt v2.0

    XOR encrypt v2.0

    Encrypt Your Text documents with XOR encryption

    ...The password you provide is hashed ( SHA256 ) and saved into the encrypted file to check if the password provided is correct.This algorithm has limitations in general more the numbers of relative characters in the password to plaintext more secure will be the encryption. XOR encrypt has a 3.5 of 5 editors rating from softpedia http://www.softpedia.com/get/Security/Encrypting/XOR-Encrypt.shtml
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    This project has a theory of time that allows a computer program to decrypt information of the past, future, or alternate time-lines using a binary counter. Currently we have developed the binary counter now we are working on a production release.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Al2 is a language, close to C++ and Java, designed for use in mathematics and science, but is procedural unlike Mathematica and Maple. Like C++, class operators can be defined. Like Java, there is no need for header files. Aled is an interface to AL2.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Payments you can rely on to run smarter. Icon
    Payments you can rely on to run smarter.

    Never miss a sale. Square payment processing serves customers better with tools and integrations that make work more efficient.

    Accept payments at your counter or on the go. It’s easy to get started. Try the Square POS app on your phone or pick from a range of hardworking hardware.
    Learn More
  • 5
    M-ICE is a modular hostbased intrusion detection framework. It is used as middleware to close the gap between IDS research and IDS development. M-ICE consists of various parts that can be connected together by using network-or interprocess-communication
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    The algorithm allows any kind of weights (costs, frequencies), including non-numerical ones. The {0, 1, ..., n-1} alphabet is used to encode message. Built tree is n-ary one.The algorithm is based on a set of template classes : Cell(SYMBOL, WEIGHT), Node(
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Software for a van eck phreaking device. Please use to test security only. <a href="http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci550525,00.html">Here</a>'s an explanation if you don't know what van eck phreaking is.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    TextCodec can encode texts using simple algorithm and then decode them by using statistical language data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Open Source Stenography engine usable from the command line. Uses various techniques for hiding and retriving stenographic information. Includes a small image analysis suite for detecting stenographic images.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Comet Backup - Fast, Secure Backup Software for MSPs Icon
    Comet Backup - Fast, Secure Backup Software for MSPs

    Fast, Secure Backup Software for Businesses and IT Providers

    Comet is a flexible backup platform, giving you total control over your backup environment and storage destinations.
    Learn More
  • 10
    Library dedicated to the parsing of network protocols and designed to be fast, auto-adaptive, asynchronous, modular and completely independent from client/server code.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next