17 programs for "windows key finders" with 2 filters applied:

  • Passwordless authentication enables a secure and frictionless experience for your users | Auth0 Icon
    Over two-thirds of people reuse passwords across sites, resulting in an increasingly insecure e-commerce ecosystem. Learn how passwordless can not only mitigate these issues but make the authentication experience delightful. Implement Auth0 in any application in just five minutes
  • Translate docs, audio, and videos in real time with Google AI Icon
    Translate docs, audio, and videos in real time with Google AI

    Make your content and apps multilingual with fast, dynamic machine translation available in thousands of language pairs.

    Google Cloud’s AI-powered APIs help you translate documents, websites, apps, audio files, videos, and more at scale with best-in-class quality and enterprise-grade control and security.
  • 1

    UFTP

    Encrypted UDP based FTP with multicast

    ... receivers to share a common key. UFTP also has the capability to communicate over disjoint networks separated by one or more firewalls (NAT traversal) and without full end-to-end multicast capability (multicast tunneling) through the use of a UFTP proxy server. These proxies also provide scalability by aggregating responses from a group of receivers.
    Leader badge
    Downloads: 1,001 This Week
    Last Update:
    See Project
  • 2
    TCNOpen

    TCNOpen

    Components for IEC61375 standardised communication

    TCNOpen is an open source initiative which the partner railway industries created with the aim to build in collaboration some key parts of new or upcoming railway standards, commonly known under the name TCN. TCN (Train Communication Network) is a series of international standards (IEC61375) developed by Working Group 43 of the IEC (International Electrotechnical Commission), specifying a communication system for the data communication within and between vehicles of a train. It is currently...
    Leader badge
    Downloads: 116 This Week
    Last Update:
    See Project
  • 3

    ION-DTN

    Delay-Tolerant Networking suitable for spacecraft and ground

    ... distribution implements Delay-Tolerant Networking (DTN) architecture, as described in Internet RFC 4838. It is intended to be usable in embedded environments, including spacecraft flight computers and ground systems. ION 4.x builds BPv7 (RFC 9171) by default, with a configure option for BPv6 (RFC 5050). Windows installers for both BPv6 and BPv7 are provided.
    Downloads: 14 This Week
    Last Update:
    See Project
  • 4
    SSHTOOLS

    SSHTOOLS

    Java SSH API

    This project now hosts the third-generation of Java SSH API, Maverick Synergy. This API builds on the Maverick Legacy commercial APIs and delivers a new API in a unified client/server framework. This API is available to the community under the LGPL open source license. This update includes ed25519 support, support for the new OpenSSH private key file format and stronger key exchange algorithms. The project continues to host both the original API and legacy applications created around...
    Downloads: 6 This Week
    Last Update:
    See Project
  • Fully managed relational database service for MySQL, PostgreSQL, and SQL Server Icon
    Fully managed relational database service for MySQL, PostgreSQL, and SQL Server

    Focus on your application, and leave the database to us

    Cloud SQL manages your databases so you don't have to, so your business can run without disruption. It automates all your backups, replication, patches, encryption, and storage capacity increases to give your applications the reliability, scalability, and security they need.
  • 5
    Scrollout F1

    Scrollout F1

    An easy-to-use anti-spam email gateway

    • Designed for Linux and Windows email system administrators, Scrollout F1 is an easy to use, already adjusted email firewall (gateway) offering free anti-spam and anti-virus protection aiming to secure existing email servers, old or new, such as Microsoft Exchange, Lotus Domino, Postfix, Exim, Sendmail, Qmail and others. • Built-in multilayer security levels make configuration effort equal to a car radio. • It combines simplicity with effective protection using powerful open source...
    Leader badge
    Downloads: 152,707 This Week
    Last Update:
    See Project
  • 6
    ( pro ping )pinger network alert monitor

    ( pro ping )pinger network alert monitor

    Pinger alert, STATICTICAL TABLES, send EMAILs or SMS by SMS GATEWAY

    ..., it is designed for the computer technician who carries a powerful tool in the USB key. In addition, an audible alarm warns you via Telnet or SSH terminal, a log files recorded can be used to convey specific information to the system administrator. It is comes with a configurable for warning by email. lightweight code, coming with the source files, written in C, Email warning sender, ANDROID ping, SPARC, AMD64, traceroute, DETECT SOURCE Downs, Warning by Email, C language
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    WiKID Two-Factor Authentication System

    WiKID Two-Factor Authentication System

    Two-factor authentication system

    The WiKID Strong Authentication System is a public-key based two-factor authentication system. It is a flexible, extensible, and secure alternative to tokens, certs and passwords. Application & API support exists for Java, ASP, PHP, Ruby, OpenVPN, TACACS+, etc. Read our eGuide on how to setup your network with two-factor authentication: http://www.wikidsystems.com/learn-more/two-factor-authentication-white-papers
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    Dirt

    Dirt

    An IRC proxy to add chat encryption to IRC clients

    Dirt is a multi-platform IRC proxy that adds FiSH-compatible chat encryption (including DH1080 key exchanges) to any IRC client. It can be used as a SOCKS proxy or as a simple bouncer. For security reasons, only localhost connections are allowed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Network Keylogger
    Network Keylogger is a program that sends every key pressed in a computer to another computer, via TCP/IP.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Multi-Site Network and Cloud Connectivity for Businesses Icon
    Multi-Site Network and Cloud Connectivity for Businesses

    Internet connectivity without complexity

    As your users rely more and more on Cloud and Internet-based technologies, reliable internet connectivity becomes more and more important to your business. With Bigleaf’s proven SD-WAN architecture, groundbreaking AI, and DDoS attack mitigation, you can finally deliver the reliable internet connectivity your business needs without the limitations of traditional networking platforms. Bigleaf’s Cloud Access Network and plug-and-play router allow for limitless control to and from anywhere your traffic needs to go. Bigleaf’s self-driving AI automatically identifies and adapts to any changing circuit conditions and traffic needs—addressing issues before they impact your users. Bigleaf puts you in the driver’s seat of every complaint and support call with full-path traffic and network performance data, delivered as actionable insights, reports, and alerts.
  • 10
    Wep key changer (wepkc) is a client/server application that allows you to protect your ad-hoc (point to point) Wireless network when you are unable to use (due to software or hardware limitations) sophisticated protocols like WPA.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    CMS, webcommerce, intranet information, simple update, file/document/mp3 archivies, next release run from USB key
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    ethereal patch and external plugin to enable ssl decryption for ssl v3 tls v1 sessions with RSA key exchange
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    ssh port forwarding - this java application creates multiple port forwarding tunnels to remote hosts, using SSH2 logins with public key or user/password. This provides secure access for mobile devices that support a java VM.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Ikedectypt is a perl script to decrypt IKEv1 packets in libpcap formatted trace file. You can use Ethereal(http://www.ethereal.com) to analyze decrypted trace. Key information(first initialization vector, skeyid_e) is needed to be supplied by user.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    YAWCU is a wireless LAN (WLAN) capture + WEP cracking utility. It can crack 64/128 Bit WEP keys on IEEE 802.11b/g networks by monitoring WLAN traffic and computing the resulting WEP key once enough packets have been gathered
    Downloads: 3 This Week
    Last Update:
    See Project
  • 16
    AirSnort is a wireless LAN (WLAN) tool which cracks encryption keys on 802.11b WEP networks. AirSnort operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered.
    Leader badge
    Downloads: 354 This Week
    Last Update:
    See Project
  • 17
    Trace2ip is to hold one trace of all connections IP, memory the information into the file. The file to have like unique key ip_source and like associate data header IP. Alternative Key:Audit, Trace, Monitor, Dump, IP.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next