Your top-rated shield against malware and online scams | Avast Free Antivirus
Browse and email in peace, supported by clever AI
Our antivirus software scans for security and performance issues and helps you to fix them instantly. It also protects you in real time by analyzing unknown files before they reach your desktop PC or laptop — all for free.
Free Download
Our Free Plans just got better! | Auth0
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Description
How To Use:
Cardito.exe <Folder Path>
e.g. Cardito.exe "D:\Card Data"
Pros:
Very Quick and Lightweight
Cardito is a simple Credit Card Number searching tool. It does a simple recursive scan of all files in the specified directory and checks the condition of the found numbers to Luhn's algorithm. It does not require installation. It has to be placed locally on the machine which is to be scanned.
Cardito is small yet powerful. Currently, it supports the following file...
Algorithm::Evolutionary provides classes for performing simple evolutionary computation tasks, including definition of objects from XML and SOAP support. It should be interoperable with other EC libraries using SOAP.
The library does quick search of dictionary words in arbitrary input strings.
Known problems are known. :) See appropriate section in documentation. Also, only ASCII words and strings for now.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
CNV Workshop is a web-enabled platform for analyzing genome variation such as copy number variation (CNV). Learn about CNV Workshop in our associated BMC Bioinformatics manuscript: http://www.biomedcentral.com/1471-2105/11/74
Basic implementation of K-nearest neighbour Algorithm and the application of KNN to classify protein sequences as transmembrane beta barrel or non-transmembrane beta barrel on the basis of whole sequence amino acid composition given as input.
Algorithm::MatchingModel is a perl library for running match simulations and statistics for two-sided matching problems. It includes classes for a preference factory, algorithm plug-ins, and gathering statistics between rounds.
Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
rrd-watcher is an intelligent alerting system that detects and alerts on abnormal data found in RRD files. Alerts can be raised by using the rrdtool Holt-Winters forecasting method, or with the rrd-watcher detection algorithm.
pythag is an algorithm and script for computing primitive Pythagorean triples using the command line. Has an option to output to a file. It also has an option to output to a graph using GLUT, to which it now depends.
vuVolume is a framework for volume rendering algorithms in C++. When creating a new rendering method in vuVolume it is possible to just concentrate on the actual algorithm and let the framework take care of the more administrative tasks.
N-stage worm propagated via SSH. It executes commands in a given list of hosts and copies files to them with rsync. The paths for its propagation to the cluster are configurable. It offers a scalable/reliable transport API thanks to its adaptive algorithm
PAM_PKA is a a PAM authentication module, enabling the use of cheap removable media for token authentication. PAM_PKA uses the DSA algorithm to perform public key authentication to verify the identity of the user requesting access rights.
NAC is a collection of tools for cryptography. The goal is to provide simple-to-use crypto tools (like an OTP, String and number generator, public key algorithm...) you can use under Linux, Windows...
A collection of implementations of the Lovins stemmer as described in "Development of a Stemming Algorithm" by Julie Beth Lovins (published in "Mechanical translation and computational linguistics", 11:22-31, 1968).
The goal of the Rats and Mazes project is to build a simple genetic algorithm to find general solutions to random non-cyclic single path mazes. I believe that the solutions will tend towards either the right/left-hand rule.
A repository of grid computing student exercises. The repository currently contains a grid-enabled mergesort using Condor. Exercises to be developed include genome analysis, genetic algorithm, integration, matrix multiply, ray tracing, etc.
Purpose of SAWS is to facilitate process of web scraping by - 1) providing a pattern specification mechanism on top of normal regular expressions 2) and implementation of common matching algorithm to run specified pattern on given source for any matches.