Security & Utilities Software


  • More...

Category Category

License License

Programming Language Programming Language

  • More...

Status Status

Audience Audience

User Interface User Interface

Database Environment Database Environment

Freshness Freshness

Security & Utilities Software

  • Focus on your Business with an integrated Business Cloud Focus on your Business with an integrated Business Cloud Icon
    Focus on your Business with an integrated Business Cloud Icon

    Reliable & Secure Business Phone Systems

    • No contracts, no cancellation fees, over 40 features
    • 99.999% financially backed uptime SLA
    • Free, expert support, certified by J.D. Power
  • Shiela USB Shield Icon

    Shiela USB Shield

    The Powerful Protection for PC Against Viruses from Removable Drives

    Shiela USB Shield is a powerful first line defense against virus from infected removable drives. * It locks autorun.inf and associate executable files in multiple instance * Delete/Freeze the shortcut file or clone file, and restores the original automatically. * It is free and open source. System Requirements 1) Windows 2000 or later 2) 256Mb RAM or higher 3) 1GHz Processor or faster 4) .NET Framework 2.0 or later must be installed

  • Android Pattern Unlocker

    Tested Devices : 1.Samsung Galaxy Y 2.Samsung Galaxy Y Duos Procedure : 1.copy both files in root of memory card 2.Insert that memory card in your android device 3.Now switch off your device 4.Now press volume up + power + home button together to start recovery mode 5.In this mode touch will not work so navigate using volume up and down keys and select using home button 6.Now select ‘update zip from sd card’ 7.Now select '' 8.Yellow coloured menu will appear 9.Select ‘install zip from sd card’ 10.Then select ‘choose zip from sd card’ 11.Select ‘’ 12.Now select ‘yes’ 13.Then the process will complete after some time 14.Now press back and select ‘Reboot Device’ 15.Now Draw Any pattern your device will unlock 16.Now to set new pattern lo

    Downloads: 103 This Week Last Update: See Project
  • Cure it! USB Healer Icon

    Cure it! USB Healer

    Recover files hidden by malware

    Cure It! USB healer is a small windows Application that is helpful in recovering files hidden by malware in removable drives. it also deletes shortcuts created in the drives and other files that are linked to the malware.The software is free for use and distribution and not for sale.

  • Fake Virus Mac  Icon

    Fake Virus Mac

    As the title suggests, this is a tutorial to make fake virus for Mac.

    We have not seen any virus for Mac OS X yet but we have seen some malwares. This trick can be useful, if you want to scare your someone who is probably new to Mac. As the title suggests, this is a tutorial to make a FAKE VIRUS FOR MAC OS X. My Website:

    Downloads: 13 This Week Last Update: See Project
  • Batch Notification Cache Cleaner Icon

    Batch Notification Cache Cleaner

    Gets rid of notification icons

    How to use: Download the file Save to your desktop Double click/tap on the .bat file to run it, click/tap on Run (if prompted by UAC), and follow the onscreen instructions in the command prompt. NOTE: If you like, you can stop getting the Run prompt by unblocking the .bat file. If successful, command prompt will ask you to restart your computer.

    Downloads: 0 This Week Last Update: See Project
  • Crypton Icon


    Program to save accounts

    It is a program to save account (username, passwords). You can import/export files. Set shortcuts for frequent used account. Update/delete data. It is a multiuser program (one password to remember all others). Link:

    Downloads: 0 This Week Last Update: See Project
  • File checksum validator Icon

    File checksum validator

    Python (2.7) script validating the checksum of a file.

    Python (2.7) script validating the checksum of a file. Supports md5, sha1, sha224, sha256, sha384 and sha512. usage -------- python <algo> <filename> <checksum> example ------- C:\Python27\python.exe C:/Users/User/Projects/Python/CheckSum/ sha256 C:\Users\User\Downloads\pycharm-community-2016.2.1.exe f800ce642c6c838c17bb726bc0ae9680fd07b3801fd82ee402155bfd5ddded7c Checksum match! Process finished with exit code 0

    Downloads: 0 This Week Last Update: See Project
  • HyveDecrypter


    C# .NET Application for Encryption and Decryption of strings for sharing passwords or usernames with friends, colleagues etc

    Downloads: 0 This Week Last Update: See Project
  • Project Vaccine Icon

    Project Vaccine

    worlds first antimalware software which spreads like a malware.

    VACCINE v1.0 Worlds first antimalware software which removes a specific set of viruses from the entire cyberspace.Unlike all the other antimalware software's vaccine is an opensource program,uses virus mode of spreading to accomplish the aim,is free of cost and doesnt affect the computer performance. Features: 1. usb disk security 2. automated virus/malware removal from usb drives 3. disinfection of specific types virus/worms/adware/malware/trojans from the computer 4. restrictions removal. 5. complete protection from viruses spreaded via usb disks. 6. Works on all versions of windows (32/64).

  • Pythia Icon


    High quality fast "true random" number generator (shuffling) for JS

    :: Pythia :: This is a high quality fast "true random" number generator / shuffling system. This means that Pythia never ever repeats the same numbers again regardless of how many tests you do. This also means that it never generates any numbers in a predictable order no matter how many times you refresh. Pythia solves a great problem and is by far the best solution out there. How to use: var my_pythia = new pythia(); Pythia API: .generate - Generate a new random number. .reset - Reset and enable to restart and -probably- regenerate same numbers. Enjoy!

    Downloads: 0 This Week Last Update: See Project
  • RRO

    Risk Reduction Overview

    The Risk Reduction Overview (RRO) method presents a comprehensible overview of the coherence of risks, measures and residual risks. The method is designed to support communication between different stakeholders in complex risk management. Despite the widely accepted need for risk management we believe this is the first practical method that delivers a comprehensive overview that improves communication between different stakeholders.

    Downloads: 0 This Week Last Update: See Project
  • Previous
  • You're on page 1
  • Next

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you