Search Results for "code encryption cd" - Page 2

Showing 46 open source projects for "code encryption cd"

View related business solutions
  • Compliant and Reliable File Transfers Backed by Top Security Certifications Icon
    Compliant and Reliable File Transfers Backed by Top Security Certifications

    Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.

    Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
    Start Free Trial
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • 1

    JMapViewer

    Java Swing component for integrating OSM maps into your Java app.

    This project offers the Mavenized format of the official "JMapViewer" project. Official project code on: https://trac.openstreetmap.org/browser/subversion/applications/viewer/jmapviewer?order=name Please, note that no development is performed in this SVN, just contains Maven artifact of official releases (starting from 1.14 version) If you want to give it a try, download code and run the Demo: > mvn compile package > cd target > java -jar JMapViewer-1.14.1-Demo.jar
    Downloads: 13 This Week
    Last Update:
    See Project
  • 2

    OFormsCI

    Continuous Integration for Oracle Forms/Reports Fusion Middleware

    OFormsCI is a set of tools to form a complete tool chain for continuous integration with Git, Jenkins, Oracle Forms/Reports and WebLogic server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    CryptoX

    AES Encryption Program

    v2.0.0 (Latest) ---CHANGE LOG--- v1.0.0 - Original Release v1.0.1 - Source Code Cleanup v2.0.0 - Now Features File Encryption Protect your privacy! Encrypt your messages and files with a cryptographic strength of up to 256 bits before sending them to others!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    MP3 ID3 Java Tag Library Tool
    ...Please rate the software once you've used it ! Also need still to learn how to upload souce code with git, but also that will come soon or later.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Auth0 B2B Essentials: SSO, MFA, and RBAC Built In Icon
    Auth0 B2B Essentials: SSO, MFA, and RBAC Built In

    Unlimited organizations, 3 enterprise SSO connections, role-based access control, and pro MFA included. Dev and prod tenants out of the box.

    Auth0's B2B Essentials plan gives you everything you need to ship secure multi-tenant apps. Unlimited orgs, enterprise SSO, RBAC, audit log streaming, and higher auth and API limits included. Add on M2M tokens, enterprise MFA, or additional SSO connections as you scale.
    Sign Up Free
  • 5

    Simplest Text Encrypter

    A simple example of polyalphabetic cipher in Java.

    Cryptography fascinates everyone. A variety of encryption techniques and ciphers are used to code important data. A polyalphabetic cipher is one of the simplest cipher one can make. This is a Java program to implement polyalphabetic cipher. [How the cipher encodes?] Input Data: helloaf Key: love l - 12th letter in Alphabet o - 15th letter in Alphabet v - 22nd letter in Alphabet e - 5th letter in Alphabet Now: h(l) e(o) l(v) l(e) o(l) a(o) f(v) Further: h(+12) e(+15) l(+22) l(+5) o(+12) a(+15) f(+22) where +(number) meaning shifting the character forward by the respective number of places. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Codegroup

    Codegroup

    A Java application for transferring computer files in 5 letter groups

    ...For content encryption, the use of Java's facilities is being considered as a long term option. This project's initial sourcecode is related to : http://www.fourmilab.ch/codegroup/ http://winmorse.com/ https://bitbucket.org/bgneal/cpp-enigma http://www.whence.com/minimodem/ For the User Interface http://www.oracle.com/technetwork/java/javafx/tools/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Maroniecoder

    Maroniecoder

    Encrypt a text through a list of encryption methods

    I came to the conclusion that this program is not worth the time for further development. Use different Encryption methods with parameters to en- or decrypted a text through the list With downloadable source-code since 1.3 You need to have Java installed http://www.oracle.com/technetwork/java/javase/downloads/index.html
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    DAL4j

    Data Access Layer 4 Java

    ...DAL4j can be useful for scenarios where there is an existing database schema but a technology other that JPA is used to interact with the database. DAL4j can provide an easy way to migrate your code base from other technologies such as JDBC or Hibernate to JPA. The beans generated can be 1 or two types: Simple or Framework. Simple beans are standard pojo classes managed by your application using JPA semantics. Framework generated pojos use the DAL4j framework DAO generic to simplify CRUD operations. DAL4j provides optional hooks to allow you to integrate encryption/decryption of data field used when data is encrypted in the database. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Using encryption to secure your code or text. Click File->Run to run your code using Ruby, see the pop up for output. Never save your text or code to disk unencrypted. Don't forget your password. Encryption is error-persistent.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    jlidegw
    IRC gateway for lide.cz chat.Written 100% pure in Java including "Lide API" (package jlidegw),which allows Java developers to make their own applications collaborating with lide.cz server.Some code parts are inspired by Python version of lidegw.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    A VM containing a turn-key solution for continuous integration with source code control, build management, automated testing, security analysis, defect tracking, and project management, all using open source tools.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Bork is a very small, cross-platform file encryption utility. It is written in Java and designed to be included along with the files it encrypts for long-term storage (eg on CD-R). Its minimal external dependencies make it fairly futureproof.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    JFish is a simple Java implementation of the popular Twofish cryptography algorithm. It allows any application to easily implement powerful encryption, using a single small library and minimal code changes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Plethora is a NetBeans plugin that provides a designer and a code-generator for Looking Glass 3D (http://www.sun.com/software/looking_glass) applications. You can download a live CD for LG3D from: http://sourceforge.net/projects/lg3d-livecd
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Java libraries and utility code for analyzing audio data and cuesheet files with emphasis on data from CDs. Support for WAV, MP3 and FLAC formats is provided.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    This software allows to pack a cdrom (or other) with a couple of images and give users different rights to view the images upon their cdrom code. This software will run on Win+Lin+Mac (hopefully.)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    DecodeBase64 does exactly what the title says: it decodes strings encoded with the Base64 algorithm. Source code is provided in both Java and C++.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    DVD/CD UDF disc drive tools, esp. for the Iomega RRD (aka Iomega REV) drive. Usability patches for UDF mkfs and fsck. Commentary for the lk MMC and UDF source code. cvs co tarballs for firewalls that defeat CVS. Links, FAQ's, troubleshooting hints.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    BIM is a Java based AOL Instant Messenger (AIM) Client featuring a full feature Swing GUI. BIM also comes with encryption support. It has a small code base (617KB w/encryption libs) and can be easily dropped and run on wide array of operating systems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    File-Security-SDK

    File-Security-SDK

    EaseFilter Comprehensive File Security SDK

    The EaseFilter Filter Driver SDK is a collection of tools, libraries, and sample code designed to facilitate the creation of Windows file system filter drivers. These drivers operate at a low level, intercepting file I/O requests before they reach the underlying file system or other filter drivers. The EaseFilter SDK provides a powerful interface for developing Windows filter drivers in C++, C#, or other programming languages that support native DLL calls. This guide helps developers...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Open eSign allows software developers and technical parties in a company to create secure, online (web-based) forms and documents that follow a business process flow and enable legally recognized electronic signatures using digital signature technology.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB