Showing 88 open source projects for "delphi usb source"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Grafana: The open and composable observability platform Icon
    Grafana: The open and composable observability platform

    Faster answers, predictable costs, and no lock-in built by the team helping to make observability accessible to anyone.

    Grafana is the open source analytics & monitoring solution for every database.
    Learn More
  • 1
    The KnightGina project is intended to do a free source replacement for MS Gina, using Object Pascal language (initially in Delphi enviromnent)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Process Monitor is an aplication for Windows 98(or above) that monitors all the process thar are running in your systems. This application is being coded with delphi 6 It allows you to kill them, to increase their priority or to query information abou
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    A tool to hide BitTorrent metainfo (.torrent files) into and restore the same back from images (and other types of files) using steganographical methods, providing friendly GUI for the process.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    ECTP - Encrypted Compressed Transfer Protocol This protocol is similar to HTTP but with commands and features like FTP. The main features are security and compression abilities and the consequent use of one perisistant connection.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5
    sechk - SEcurity CHecKer It is a powerful and useful tool to check if you got exploited and rooted, it will use checksum comparation via md5 sum, it exchanges file lists and csums from the sechk server. It\'s gonna work with all posixes and unixes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    proDETECT is an open source promiscious mode scanner with a GUI.It uses ARP packet analyzing technique to detect adapters in promiscious mode.This tool can be used by security administrators to detect sniffers in a LAN.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    The secsuite Security Suite is, as it is called, a security suite. At the moment, only a portscanner with a graphical GUI is implemented. Screenshots of it are not yet avaiable.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Encrypts, decrypts, sign, and verify text and binary messages using CryptoAPI. Also compresses and send those messages via a TCP/IP network.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    The Program Killer is a Delphi 6 program that monitors the Process List on Windows 95/98/Me and Windows NT4/2000/XP for unauthorized EXE files (User Definable) and if found, those Processes are Terminated via the Windows API.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Total Network Visibility for Network Engineers and IT Managers Icon
    Total Network Visibility for Network Engineers and IT Managers

    Network monitoring and troubleshooting is hard. TotalView makes it easy.

    This means every device on your network, and every interface on every device is automatically analyzed for performance, errors, QoS, and configuration.
    Learn More
  • 10
    Vopos gives you a visual representation of FW1 objects. It will be able to dump objects to a db or file and perform some simple checks against an internal DNS. It is useful to check consistence of configuration across a network.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    IDTrans is developing b2b technologies. The primary aspects of the project are secure transmission libraries, a key server, and a application to demonstrate the use of the libraries.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Raptora is a tool to generate statistics of the traffic usage of a Axcent Raptor Firewall. It uses a database to store the gained informations from the logfiles and then it generates graphical statistics and a report.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Terrier is a RBAC framework, business oriented and with focus on manageability and access control. Integrating all company tecnhnologies (java, ruby, delphi and others). The owner of a system can manage and delegate manageability to the systems, reducing
    Downloads: 0 This Week
    Last Update:
    See Project