Showing 1103 open source projects for "using"

View related business solutions
  • Outgrown Windows Task Scheduler? Icon
    Outgrown Windows Task Scheduler?

    Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.

    Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
    Download Free Tool
  • MyQ Print Management Software Icon
    MyQ Print Management Software

    SAVE TIME WITH PERSONALIZED PRINT SOLUTIONS

    Boost your digital or traditional workplace with MyQ’s secure print and scan solutions that respect your time and help you focus on what you do best.
    Learn More
  • 1
    DogoIDS

    DogoIDS

    Active-probing-based network IDS for wireless networks

    .... *** IMPORTANT *** We uploaded the very first experimental implementation of DogoIDS (still alpha), so expect to find bugs. The Documentation is sadly not yet fully done. So far, we did experiments using a IEEE 802.11s network (open80211s kernel 3.10.0-rc4-wl). We are happy to receive comments.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    File system/directory monitoring utilities with loggin and task processing support (can execute files or make a WCF service call). Multiple configuration options. Source code libraries can be used to create a custom file system monitor.
    Leader badge
    Downloads: 32 This Week
    Last Update:
    See Project
  • 3

    TheHive

    Network Tester using PING

    TheHive is a software tool for testing internet connections using PING packets.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    ...The LMSRT project itself is licensed under the creative commons license, Attribution-NonCommercial-ShareAlike 3.0 United States BY DOWNLOADING THIS APPLICATION YOU AGREE TO THE LICENSING OF EACH INDIVIDUAL ANTIVIRUS APPLICATION. THIS APPLICATION COMES WITH ABSOLUTELY NO WARRANTY ***I'm currently re-building the project using Debian live-build. I've removed the file that existed in the files area.
    Downloads: 0 This Week
    Last Update:
    See Project
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 5
    Windows Screen Locker

    Windows Screen Locker

    Tool for lock your computer screen to protect accessibility by others.

    Screen Locker Description: Screen Locker is a security tool for all 32 bit and 64 bit editions of Windows. Using this tool you can lock your PC screen to protect accessibility from other users. Instruction: Choose a password, confirm password and click OK. Then your screen will locked. You can unlocked it only by given correct password and can change it by clicking 'Change Password' button.If you forget your password then press windows button from your keyboard and restart your PC. ...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 6

    Simplest Text Encrypter

    A simple example of polyalphabetic cipher in Java.

    Cryptography fascinates everyone. A variety of encryption techniques and ciphers are used to code important data. A polyalphabetic cipher is one of the simplest cipher one can make. This is a Java program to implement polyalphabetic cipher. [How the cipher encodes?] Input Data: helloaf Key: love l - 12th letter in Alphabet o - 15th letter in Alphabet v - 22nd letter in Alphabet e - 5th letter in Alphabet Now: h(l) e(o) l(v) l(e) o(l) a(o) f(v) Further: h(+12)...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    My attempt to create cross-platformed password generator using Qt
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    RDonasco Security

    A security application that can be used as a shared service

    For full details of this application, please visit https://bitbucket.org/rdonasco/rdonasco-lib/wiki/Home The source codes for this project can be downloaded by cloning its repository which uses mercurial. ** Use the following clone command: ** hg clone https://bitbucket.org/rdonasco/rdonasco-lib
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    Password Meter

    Entropy based password strength meter using javascript

    This small project is password strength meter for web pages written in javascript and html. The password strength is based on the entropy of the character sets used. Entropy in this case means the number of possible combinations of lowercase letters, uppercase letters, digits, and special characters that are possible in a password. Please see the project home page at http://passwordmeter.sourceforge.net. This project was inspired by a Randall Munroe cartoon at http://xkcd.com/936/.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 10
    SmartRM

    SmartRM

    Keep on sharing - do it the Smart way!

    Control who uses your files, and how. - Prevent unauthorized printing, copying and sharing - Set time limits on file use - Track who is using your files, and how - Keep control of your file even AFTER the file was sent STANDALONE VERSION If you don't have admin privileges on your PC, or you don't want to perform the full setup, you can daownload a standalone version and just unzip SmartRM in any folder and run from there.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    Hash Me

    Hash Me

    Create different hash results to take an unique file identification.

    Very easy and simple to use. The Hash Me is a free tool that can create differents hash results from files using differents algorithms. Besides that, the app can be used to create an additional file which can be distributed with the original file. This one creates the chance for the receiver confirm that the original file didn't take any modification along the way. ============= HOW IT WORKS ============= * For full help description, type "hashme.exe -help" at command line. => hashme.exe <filename> <hash algorithm> Output the hash result from specified file. => hashme.exe <filename> -c Create a .hashme file with hash information about the specified file. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    ICRON's Keyloger

    Version one of ICRON's Basic Keylogger

    ...I do not condone any nefarious uses for said keylogger. DO NOT USE ON ANY SYSTEM THAT IS NOT YOUR OWN. Also you must inform all users of said computer (if their are multiple accounts) that you will be using said program. I am not responsible for how you use this. (*Note: Looking for more positive criticism than actual publishing)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    dCrypt - Android Encryption Decryption

    dCrypt - Android Encryption Decryption

    An Android application for encryption and decryption

    It is a simple android application for encryption and decryption of files using passphrase. Supported API levels are in the range 10 (min) and 17 (max). To encrypt a file, what you need is to share the file to "DCrypt" and enter a passphrase. To decrypt the file, you have to share the encrypted file to the application and enter the passphrase. Obviously the passphrase for encryption and decryption should be the same.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    PBM stealth

    Data hiding in bi-level pbm images

    Implementation of block parity for hiding data in bi-level pbm images in java. Increasing the security of stenography by using a random symmetric key for embedding and extraction of data from image. The project also has a PBM viewer in java and ascii viewer which shows the pbm images in ascii format.This project uses binary coded pbm images. Research paper : http://arxiv.org/abs/1304.1683 Key mechanism is not functional and program have bugs which are to be fixed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Wave Framework

    Wave Framework

    Open Source API-centric PHP Micro-framework

    ...Wave is a compact framework that does not include bloated libraries and features and is developed keeping lightweight speed and optimizations in mind. While not necessary for using Wave Framework, it comes by default with a URL and View controllers intended for building websites by solving URL requests and loading views. Mercurial and Git repositories is available for developers who are interested in following the development. Official website and documentation: http://www.waveframework.com Social networks for latest news: Google+ - http://plus.google.com/106969835456865671988 Facebook - http://www.facebook.com/waveframework Twitter - http://www.twitter.com/WWWFramework
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    F-Talk P2P Encrypted Secure Voip

    F-Talk P2P Encrypted Secure Voip

    F-Talk cross-platform p2p encrypted secure voip software

    This project connect to two peers directly ( using without any central server, stun server ) together with 128bit encrypted secure voip communication. http://ftalk.armanasci.com/guide Spefications * Peer to peer direct connection without using any central dedicated server. ( First basic part of the security ) * 128bit AES Symmetric end-to-end encryption PCM datas. ( Second basic part of the security ) * 64bit Base64 Encoding transferred server side info
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17

    MyZone Social Network

    peer to peer social network

    ...In addition you can share unlimited mp3s and mp4s with your friends. MyZone does not downgrade the resolution of your photos and all established connections are encrypted using state of the art encryption techniques. MyZone is designed to be resilient towards cyber attacks especially DDoS attacks and government imposed censorships. MyZone should be an interesting social networking platform for users who are more concerned with the privacy of their profile information.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    Reactor Breeder

    A Genetic Algorithm for Reactors in StarMade

    ...One of the more unique aspects of the game is that ship power management is not as simple as filling a cube with power generation blocks. This mechanism leads to difficulties in getting maximal power generation out of such reactors. This program rectifies this issue by using a self-organizing variant of brute force search. Much of the search space is pruned early on by a user-selectable fitness function. Within a few epochs, reactor output quickly converges to several sub-optimal, yet high-output reactors. Given enough time, the idea is that the optimal reactor configuration will be yielded.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    Intrusion Block (IBlock) is a small Linux daemon which greps the alertfile of an IDS such as Snort or Suricata and blocks the offender hosts for a given amount of time using iptables.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    SecurePassG

    Creates Secure Passwords

    ...It is based on what I understand about password criteria needed to thwart most password guessing software. When saving or writing down a password, you may want to encrypt it using an encryption software like Encrypto available under my profile. When saving your password, you choose the extension you want to use, .txt should be fine. In addition to the original Java version, there is also a Windows .exe version written in C# that currently doesn't have the ability to save the password, just copy and paste it anywhere. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    Vigenere Dictionary Attack

    Vigenere brute force / dictionary cracking tool

    This is a tool that uses a combination between a brute force and dictionary attack on a Vigenere cipher. At present, keys are generated using brute force (will soon try passwords generated from a dictionary first). Each key is then used to decode the encoded message input. The output is analysed and then put into a ranking table. Outputs will be ranked on a variety of factors (at present, only number of dictionary words in output are counted). For the future: Better key generation, trying combinations of dictionary words with numbers. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 22
    phpMyDiamo

    phpMyDiamo

    Extension of MyDiamo

    MyDiamo is the first comprehensive free encryption software for MySQL. phpMyDIamo is Web-based GUI based on phpMyAdmin, and the extension of MyDiamo. You can encrypt and decrypt your sensitive data using phpMyDiamo
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    ShieldWan

    Secure public portal

    ...Once authenticated, project users may access to applications available to them without having to re-authenticate. It allows to have secure accesses and a single users management for all applications through LDAP API. Users access the project using a public Web portal protecting existing private made applications. To allow users to connect to infrastructure through external method, the project consists of : - An identification made of a double security with: o an identifier and a unique password per session (One Time Password) o A method for sending "One Time Password" via SMS, Private Mail, Twitter Direct Message...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    A pure java library to operate on OpenPGP cards directly using javax.smartcard apis with no need of external dlls/frameworks (such as pkcs11 or opensc-java). Includes sample OpenPGP card edit application.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    EAESCrypt

    Extended AES Cryptography

    EAEScrypt is a utility that is designed to protect sensitive data using secure encryption. It uses the Advanced Encryption Standard (AES) as published by the Federal Information Processing Standards Publications (FIPS PUBS) and issued by the National Institute of Standards and Technology (NIST). The official version of AES allows only 128-bit, 192-bit or 256-bit keys, and EAESCrypt is fully compliant with FIPS-197 when using these values.
    Downloads: 0 This Week
    Last Update:
    See Project