Showing 4 open source projects for "using"

View related business solutions
  • Outgrown Windows Task Scheduler? Icon
    Outgrown Windows Task Scheduler?

    Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.

    Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
    Download Free Tool
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 1
    Seed Tag

    Seed Tag

    Hide your SEED phrase in a fake SEED phrase

    ...Эта программа попытка сделать что-то вроде brainwallet, можно используя три ключа (число, пароль и адрес почты) превратить свою сид-фразу в бессмысленную сид-фразу, которую уже можно записать на железный кошелёк/армейский жетон(dog tag). Настоящего шифрования здесь нет, но от честных людей может помочь. Pack your seed phrase into fake phrase using three keys (some number, password and email) Warning! this is not tested for security. I made this for myself, when i wanted to make the cheapiest iron crypto wallet from a dog tag. This program is a simple way to protect my seed phrase if others see my dog tag howto: 0 unplug internet connection!!! and use temporary os system 1 paste seed phrase as string into memo 2 enter three keys 3 pack it 4 copy packed seed as string 5 paste packed seed into memo 6 unpack it 7 compare unpacked seed wtih original seed 8 profit
    Downloads: 14 This Week
    Last Update:
    See Project
  • 2
    Cryptonik

    Cryptonik

    Text encryption tool using Vigenère cipher

    Cryptonik-Text is a useful, simple to use tool for encrypt/decrypt text docs, messages, notes etc. Application uses a charset that can be typed from any keyboard (on-screen or hardware). Some national symbols are converted to 26 standard latin letters.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Rose Crypt provides users with a simplistic application that can be used for encrypting files in your computer using a custom passphrase. With its minimal design, Rose Crypt can be used by both advanced and beginner users. Once the encryption process is finished, you can access the newly created file from the location you previously selected.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    Passwort Kalkulator

    Erzeugt/Berechnet Passworte mit hilfe von Pseudozufallszahlen

    ...Die Namen der Dienste können in einer Liste (im Klartext) mit einigen Optionen hinterlegt werden und nach diesen Angaben wird bei jedem Programmlauf das entsprechende Passwort erzeugt. Das Programm ist ohne Installation lauffähig. Auf dem Rechner wird kein Passwort gespeichert! Only remember one complicated password and produce with it by using pseudo random numbers many different, secure passwords (reproducibly) for all your services and applications. Service names can be stored in a list (in plain text) with some options, and after this the appropriate password is generated on each run. The program can run without installation. On the computer, no password is saved! ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • Previous
  • You're on page 1
  • Next