Showing 266 open source projects for "file::rsyncp"

View related business solutions
  • Top-Rated Free CRM Software Icon
    Top-Rated Free CRM Software

    216,000+ customers in over 135 countries grow their businesses with HubSpot

    HubSpot is an AI-powered customer platform with all the software, integrations, and resources you need to connect your marketing, sales, and customer service. HubSpot's connected platform enables you to grow your business faster by focusing on what matters most: your customers.
  • All-in-One Payroll and HR Platform Icon
    All-in-One Payroll and HR Platform

    For small and mid-sized businesses that need a comprehensive payroll and HR solution with personalized support

    We design our technology to make workforce management easier. APS offers core HR, payroll, benefits administration, attendance, recruiting, employee onboarding, and more.
  • 1
    This project provides a user-level command to edit NFSv4 Access Control Lists (ACLs). The command allows users to display and change NFSv4 ACLs from clients that do not have complete NFSv4 ACL support.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Tristero is a framework for creating distributed peer-to-peer file sharing applications. It uses standard technologies for each component, reducing the work of implementing a particular network architecture to the novel aspects of that system and eliminat
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Shade is a versatile LSB (least significant bit) manipulation and analysis tool used to hide/retrieve files from within other files, such as images. The goal is to make the existence of the hidden file completely undetectable, and optionally encrypted.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    DelFileLock is a Win32-only Software and tries to delete or only unlock a file, which is still used and locked by another process. Normal deletes do not work, because of window's generated filesystem-errors.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Omnichannel contact center platform for enterprises. Icon
    Omnichannel contact center platform for enterprises.

    For Call centers or BPOs with a very high volume of calls

    Deliver a personalized customer experience with every interaction, across every channel, with uContact, net2phone’s cloud contact center solution.
  • 5
    Eraser software for secure deletion of files and cleaning of free disk space with full functionality and lightweight GUI.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    cpm is a small console tool to manage passwords and store them public key encrypted in a file - even for more than one person. The encryption is handled via GnuPG so you can access the programs data via gpg as well.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    deface-no-tnx is an anti-defacement system that monitors your Web files and notifies you about unallowed changes. It also replaces the defaced page with a standard "error" page,so that no offensive/joking content can be frauodolently added to your site
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    ext2hide allows users and administrators to utilize the reserved space of the ext2/3 superblocks to store hidden data on their filesystems, rendering it inaccessible to any normal viewing, yet still residing in permanent storage on disk.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 9
    fswatch is a small, simple utility that detects changes in a filesystem. it watches for a file system integrity. it checks inode, links, uid, gid, mode, size, flags, ctime, checksum (SHA1).
    Downloads: 2 This Week
    Last Update:
    See Project
  • PRTG Network Monitor | Making the lives of sysadmins easier Icon
    PRTG Network Monitor | Making the lives of sysadmins easier

    Stay ahead of IT infrastructure issues

    PRTG Network Monitor is an all-inclusive monitoring software solution developed by Paessler. Equipped with an easy-to-use, intuitive interface with a cutting-edge monitoring engine, PRTG Network Monitor optimizes connections and workloads as well as reduces operational costs by avoiding outages while saving time and controlling service level agreements (SLAs). The solution is packed with specialized monitoring features that include flexible alerting, cluster failover solution, distributed monitoring, in-depth reporting, maps and dashboards, and more.
  • 10
    the pupose of this program is seal the data in a bmp file;the bmp file will still ok;you can unseal the data from the bmp file in the future
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Common Hardware Recovery Solutions by Ukrainian-Russian network
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    a project to implement an nfsv4 sytle acl model (with enforcement) for the linux os enviroment, including a vfs module for samba.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    This PAM module provides the ability for users to have encrypted directories which are mounted automatically on login and unmounted after logout. The Device Mapper's CRYPT target provides the encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    yafic is Yet Another File Integrity Checker, similar to Tripwire. yafic, however, is fast, simple, and yet flexible. Config files are similar to Tripwire's, even supporting flag templates. It uses SHA-1 as its hash function.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 15
    Cryptcat is a lightweight version of netcat with integrated transport encryption capabilities.
    Downloads: 16 This Week
    Last Update:
    See Project
  • 16
    LKL is a userspace keylogger that runs under Linux on the x86 arch. LKL logs everything that passes through the hardware keyboard port (0x60). It translates keycodes to ASCII with a keymap file.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 17
    Trivial Rolebased Authorisation Context Statemachine (TRACS). An incident response capable authorisation system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Yapk is a website password manager written in C that uses gpg to en/decrypt its database. It stores the site name, url, a comment, site e-mail address, username and password for each site. Because it is separate from your browser it is more secure.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Utmpd is a small and flexible daemon written in C.It's used as a tool for user acces control. It scans the utmp file seeking for loged users and kills the user if he matches deny rule (eg. if he'strying to log in at some predefined time, denyed host etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Easy integrity check system is easy to install and use file integrity system. Primarily ment for system administrators to aid in intrusion detection.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 21
    Rsync friendly encryption that runs on the UNIX command line. Encrypt a file and backup the changes to an untrusted host.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    tcpick is a textmode sniffer; it tracks tcp streams, shows the status, reassembles and saves the data captured in files or displays them in the terminal in different modes (ascii, hex..). There is a color-mode. Useful to get files passively.
    Leader badge
    Downloads: 14 This Week
    Last Update:
    See Project
  • 23
    Cryproc is module for the Linux kernel 2.6 which allows user space programs to access the kernel's CryptoAPI functions via a file called "cryproc" created in the /proc filesystem.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Cutlass is C/C++ P2P application for secure chat, file transfer, and VoIP. It GUI's for Linux/GTK+, Windows/Win32, and (eventually) Apple's OSX/Cocoa.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Primary Cryption -- a data protection tool. Uses thousands of prime numbers as sources of pseudorandom digits for performing extremely strong encryption of multiple files. The key is an average ordinary file; its content is used to select the primes.
    Downloads: 0 This Week
    Last Update:
    See Project