Your unified business intelligence platform. Self-service. Governed. Embedded.
Chat with your business data with Looker. More than just a modern business intelligence platform, you can turn to Looker for self-service or governed BI, build your own custom applications with trusted metrics, or even bring Looker modeling to your existing BI environment.
Encryption with symmetric-key algorithm Kirmah
- generate keys with exotic chars
- redefine key length
- key mark to ensure decryption capabilities
- mix data
- fast with multiprocessing
- possible compression
- gui on gtk3
- cli tool
- python3
DEPENDENCIES :
========
python3, python-gobject, gobject-introspection, pygtk
3 modes are available to encrypt :
========
- compression (full / disabled or only final step)
- random...
Not only a Google authenticator for 2-step verification for Java ME enabled phones. This is MIDlet-1.0 implementation of RFC 6238 authenticator - TOTP: Time-Based One-Time Password Algorithm. It's quick, simple and it supports multiple profiles.
Plugin adding TOTP to KeePass2 tray menu, entry list and auto-type.
Time based One Time Password Plugin to enable 2 step authentification (supports Google and Dropbox) by generating TOTPs from the KeePass tray icon. This plugin also provides a custom column to display and/or generate TOTP's. Auto-Type is also supported when the specified custom field is used in a keystroke sequence.
This plugin requires KeePass 2.21 as it uses features that are not available in earlier versions.
Web AND Mobile (Apple iPhone) based, multi user, java port of the KeePass project. A free, easy to use password manager which helps you to manage your passwords in a secure way. Focused on deep encryption and ease of use.
FrozenBox security & penetration testing Operating System
this is the second step in the development the pentesting distro now known as Parrot Security OS
this project is closed, it was preceded by BlackAudit and continued by frozenboxOS and now by Parrot Security OS that is the project now completed
This is the extended euclidean algorithm implemented in haskell.
It will put every single step of the algorithm in a file and show the actual result and everything in between.
Open2SA is the 2 Step Authenticator, a PIN ciphering, 2 Factor Authentication process using a Dynamic Grid Card. The authentication technique is simple and secure and the code required for the process is compact and easy to understand.
HumanSudokuSolver is intended to solve Sudoku puzzles in a way human beings would do (non brute force). It currently solves most of the puzzles I tried and can output a step-by-step solution. Developers who want to contribute are welcome!
This is an application that will lock your computer (and perform other actions) when you step away from it. It uses the USB Wireless PC Lock/Wireless Defender hardware. It is written in C# and VB.NET. It is for the win32 platform.
Get a unified timekeeping, scheduling, payroll, HR and benefits portal with WorkforceHub.
WorkforceHub is the instantly useful, delightfully simple to use, small business solution for tracking time, scheduling and hiring. It scales as your business grows while delivering the mission-critical features an organization needs. It is tailored to, built for, and priced for small business employers.
Iron Bars Shell is a restricted Unix shell. The user can not step out of, nor access files outside the home directory. It is written in C for Linux. No libraries used. It is small, fast, secure. Two ascii configuration files for more control.
A sendmail Milter written in Python. It rejects Mail containing certain attachment filenames (.exe, .pif ..., configurable) or containing a virus (calling a single-user license commandline scanner) by answering the smtp DATA step with "554 5.7.1". Thus
It provides a common interface to different message digest algorithms, such as MD2, MD4, MD5, SHA, SHA1, SHA256, SHA384 and SHA512. Other algorithms can be added later. Also, it provides a debug capability to export the result at every step.
... transaction load up to 2000 TPS.
BP-Sim HSM module provides an adequate TCP/IP simulation of the Thales Hardware Security Mod.
BP-SeeEMV simulates the steps involved in an EMV transaction that take place in the EMV terminal and the Issuer Server (when conducted online). Module can process a transaction one step at a time in step-by-step mode or to certain break-point.