Showing 12 open source projects for "computer driver update"

View related business solutions
  • Cloud-based help desk software with ServoDesk Icon
    Cloud-based help desk software with ServoDesk

    Full access to Enterprise features. No credit card required.

    What if You Could Automate 90% of Your Repetitive Tasks in Under 30 Days? At ServoDesk, we help businesses like yours automate operations with AI, allowing you to cut service times in half and increase productivity by 25% - without hiring more staff.
    Try ServoDesk for free
  • Smart IT Monitoring Icon
    Smart IT Monitoring

    We make IT management effective and simple. Easily observe your networks, servers, cloud services, containers, devices and applications.

    NetCrunch is a smart, agentless network monitoring and management software system capable of monitoring every device in a network. Developed by AdRem Software, NetCrunch helps businesses of all sizes remotely monitor network services, switches, routers, bandwidth utilization, and traffic flow and visualize their system performance.
    Learn More
  • 1
    Temp_Cleaner GUI

    Temp_Cleaner GUI

    A free and open-source program to free up disk space

    ...At the same time. ⚠ Attention existing users: Please update your copy of Temp_Cleaner GUI to latest version!
    Leader badge
    Downloads: 1,213 This Week
    Last Update:
    See Project
  • 2

    ProxyCryptGUI

    An easy to use 'front-end' to ProxyCrypt 3.X encryption application

    ProxyCryptGUI2025 • ProxyCryptGUI2025 is a free application that provides a Windows GUI (graphical user interface) for ProxyCrypt to manage encrypted virtual disk drives. • The setup file for ProxyCryptGUI2025 includes the required setup of ProxyCrypt 3.x and required AIM disk driver. • All files stored in an encrypted virtual drive can be accessed just as any files on regular disk drives but only after the drive is mounted/opened with the associated passphrase. • ProxyCryptGUI2025 can open and convert most (but not all) older ProxyCrypt 2.x encrypted containers. • ProxyCryptGUI2025 is currently a beta version release... be sure to keep data backed up Requirements: • Windows 7, 8 or 8.1, 10, 11 64b • computer administrator privileges • CPU with SSE2 instructions
    Downloads: 4 This Week
    Last Update:
    See Project
  • 3
    Adldap2

    Adldap2

    LDAP Authentication & Management for Laravel

    ...You'll feel right at home. LDAP records are returned as individual models. Easily create and update models then persist them to your LDAP server with a simple save().
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    metasploitable3-ub1404upgraded

    An ova file for Metasploitable 3 ubuntu 14.04 virtual machine

    ...Download here https://sourceforge.net/projects/metasploitable3-ub1404upgraded/files/ Upgraded build from this project https://github.com/rapid7/metasploitable3 apt update && apt upgrade ran on it Jan 8, 2022 . ESM repository not added so 169 or so security updates could be made further. Otherwise ubuntu no longer supplies upgrades to 14.04. Hard disk in vmdk format. To add to VirtualBox as a VM. Download Metasploitable3-ub1404.ova Selerct FILE tab, Choose Import Appliance Browse for this ova file on your computer. ...
    Leader badge
    Downloads: 763 This Week
    Last Update:
    See Project
  • gtechna: Digital Platform for Parking Enforcement & Management Icon
    gtechna: Digital Platform for Parking Enforcement & Management

    For companies looking for an enforcement software

    Meet the ever-evolving needs of parking rules, parkers, and curbside space with secure and efficient enforcement solutions that fulfill operational goals and provide helpful, convenient service. We consider every client a partner—and customer success and growth are our primary goals. That’s why we work alongside you to understand your needs, then deliver innovative solutions that work specifically for you. Private lots and garages come in all shapes, sizes, and forms. That’s why we provide a full range of solutions to help maximize compliance, eliminate congestion, and increase turnover, so your property is as efficient as possible. Off-street parking can require a system capable of handling sophisticated business rules. Our feature-rich off-street solutions provide you with the breadth of functionality you need to run an efficient parking operation.
    Learn More
  • 5
    DNS-Based Host Blocking for Android

    DNS-Based Host Blocking for Android

    DNS-based Host Blocker (and lightweight ad blocker) for Android

    This is a DNS-based host blocker for Android. In the default configuration, several widely-respected host files are used to block ads, malware, and other weird stuff. On the first start, you must manually update the hosts files (using the refresh button) before the service can work correctly (issue #1); and you must also update the hosts files yourself regularly for now. Items in the hosts and DNS servers lists can be moved around and removed) of the list using standard RecyclerView...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 6
    Windows Defender Central v0.5

    Windows Defender Central v0.5

    Windows Defender Central

    A very basic centralized management for Windows Defenders. It is in BETA state, but it is usable. It works only with Windows 10 Defenders. Updated the code: it is now compatible with build 2004 and it uses multithreading to query the machines. It uses PowerShell and SysInternalsSuite(PsExec.exe) to gather the information and it stores the data in a shared network drive (what the computers can access and have write access). It can store the data locally, if needed. What are the...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Advanced Persistent Security

    Advanced Persistent Security

    Advanced Persistent Threat Security

    The architecture of the system is integrated by different Fingerprinting mechanisms. The system is designed from a core that avoids the detection of sdhash and Memory analysis Built-in security, allows anonymous browsing by filtering requests external identification, Exit Tor Nodes and using the TOR Fingerprinting structure The system is designed to navigate without being detected or registered by any search engine or online platform denying all types of response to servers, The...
    Downloads: 22 This Week
    Last Update:
    See Project
  • 8
    White Knight

    White Knight

    Machine Shutdown Security Tool

    Knock down your server into full disk encryption when a user attempts to physically attack your hardware via USB. This project seeks to provide a quick any easy low overhead solution that will shut your computer down to trigger your full disk encryption before an unsophisticated adversary has time to extract sensitive data. News: Alpha 0.04 Hotfix Update - Passwords now work! - Successfully tested against USB Rubber Ducky! This release I worked on building out a class that can be used to start offensive attacks on the target USB. ...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 9
    Skope Surveillance Suite [DEPRECATED]

    Skope Surveillance Suite [DEPRECATED]

    Monitor Activity on your Computer by Auto Screenshot Capture

    ...A SkopeShot is a packaged number of images that were taken from the screen at a specified delay interval. These are designed to give you a rough idea of your child or other computer user's online activities. Additionally, the Keylog section displays recordings of keystrokes on the computer and how they correlate with the SkopeShots that were taken. **UPDATE!** Version 1.6 is out.
    Downloads: 0 This Week
    Last Update:
    See Project
  • The Modern, Flexible, and Easy-to-use LIMS Icon
    The Modern, Flexible, and Easy-to-use LIMS

    For Laboratory Managers, Laboratory Directors, Laboratory Techs, Laboratory Operations Staff

    Run your entire lab more efficiently with our highly configurable and flexible LIMS. Automate your workflow to process more samples, generate reports faster, and grow your laboratory.
    Learn More
  • 10

    Restrict Application

    Easy to use parental control

    ...Original description: Restrict Application is powerful parental control software that can easily block adult content or any other site, game or software. Restrict Application can be set to update it's configuration from remote server allowing to update configuration simultaneously on large number of computers. This software has also built-in remote control which can be used to pause or turn off this software from other computer.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    WhitewallManager

    Whitelist manager

    WhitewallManager is a whitelist manager. It aims to be a web based administration tool for administrators using a default-deny approach to the security of the network they are responsible for. Default-deny is a superior model for network security as compared to default-allow, which is how the security model of most local area networks is modeled. Default-deny disallows all but access granted to resources which you specifically allow. The advantage to this is that any new resources which...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    ANPR for National Borders

    ANPR for National Borders Systems

    The idea is to enhance and develop the national border crossing process by the integration of automated vehicle recognition while crossing country borders. i'm going to use Automatic number plate recognition (ANPR): a system that recognizes the numbers of the vehicle plates by using OCR (optical character recognition) technology and Infrared cameras. This is going to be achieved by taking the license plate image from the camera and processing it using the software I’m going to develop...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next