Showing 1285 open source projects for "mpeg-4"

View related business solutions
  • Passwordless authentication enables a secure and frictionless experience for your users | Auth0 Icon
    Over two-thirds of people reuse passwords across sites, resulting in an increasingly insecure e-commerce ecosystem. Learn how passwordless can not only mitigate these issues but make the authentication experience delightful. Implement Auth0 in any application in just five minutes
  • Eptura Workplace Software Icon
    Eptura Workplace Software

    From desk booking and visitor management, to space planning and office utilization data, Eptura Workplace helps your entire organization work smarter.

    With the world of work changed forever, it’s essential to manage your workplace and assets together to effectively create a high-performing environment. The Eptura experience combines the power of workplace management software with asset management, enabling you to effectively operate your building and facilitate hybrid work.
  • 1

    Password generator Java CUI application

    Password generator Java CUI application

    Password generator Java CUI application.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Adsocks

    Adsocks

    Administrador Remoto

    Herramienta de Administración Remota opensource escrito en Java. Nota: El creador de este herramienta no se hace responsable del mal uso que le puedan dar a esta herramienta.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Secure user authentication system

    Secure user authentication system

    A really secure user authentication system in PHP and MySQL.

    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    VMI Honeymon

    IDS/Honeypot monitor based on LibVMI and Volatility

    IDS/Honeypot monitor based on LibVMI and Volatility
    Downloads: 0 This Week
    Last Update:
    See Project
  • Automated RMM Tools | RMM Software Icon
    Automated RMM Tools | RMM Software

    Proactively monitor, manage, and support client networks with ConnectWise Automate

    Out-of-the-box scripts. Around-the-clock monitoring. Unmatched automation capabilities. Start doing more with less and exceed service delivery expectations.
  • 5
    AUKS is an utility designed to ease kerberos V credential support addition to non-interactive applications, like batch systems (LSF,Torque,...) or resource managers (Slurm,...). It includes a plugin for SLURM resource manager.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Password Manager+

    Password Manager+

    Password manager program that helps manage passwords.

    This is a very efficient password management program that makes managing your passwords very easy and flexible with groups and a database where all your passwords are securely stored. Features include efficient random password generator, with passwords generated from user choices (uppercase, digits...), view/close columns, copy username/password, etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    WAPI
    WAPI, or WOMBAT API, is a SOAP-based API built in the context of the WOMBAT FP7 project (http://www.wombat-project.eu) to facilitate the remote access and exploration of security-related datasets.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    SMPPS

    SMPPS

    Simple Multi Protocol Packet Sniffer - SMPPS

    SMPPS Project already in its Beta version to 0.9.9 almost in the final version be in the documentation and material help that missing as well as the necessary translations of such material. However, with great joy that I come to the dicer SMPPS this now rather towards what the expectations of the project believed that he would be able: Capture and log packages generate the following protocols without using libpcap, but just using BSD Sockets. protocols: IP TCP UDP ICMP IGMP Inside the...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Software library for development of Swedish Medical administrative applications involving secure communication and document handling. Implementation supports standards as CMS/SMIME and modern XML security standards from W3c, Oasis etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Multi-Site Network and Cloud Connectivity for Businesses Icon
    Multi-Site Network and Cloud Connectivity for Businesses

    Internet connectivity without complexity

    As your users rely more and more on Cloud and Internet-based technologies, reliable internet connectivity becomes more and more important to your business. With Bigleaf’s proven SD-WAN architecture, groundbreaking AI, and DDoS attack mitigation, you can finally deliver the reliable internet connectivity your business needs without the limitations of traditional networking platforms. Bigleaf’s Cloud Access Network and plug-and-play router allow for limitless control to and from anywhere your traffic needs to go. Bigleaf’s self-driving AI automatically identifies and adapts to any changing circuit conditions and traffic needs—addressing issues before they impact your users. Bigleaf puts you in the driver’s seat of every complaint and support call with full-path traffic and network performance data, delivered as actionable insights, reports, and alerts.
  • 10
    Sguil's (pronounced sgweel) main component is an intuitive GUI that receives realtime events from snort/barnyard. It includes other components which facilitate the practice of Network Security Monitoring (NSM) and event driven analysis of IDS alerts.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 11
    Ralasafe Access Control Middleware focus on data-level privilege management, including database row/column and content privilege management. It also manages 2) login control; 3) function-level privilege management; and 4) URL privilege authentication
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    OhCrypt Encryption Tool
    OhCrypt lets you easily encrypt and decrypt files using some of the most popular algorithms, like AES, Blowfish and Serpent. With OhCrypt, you can secure your data with a password-based encryption algorithm through a clean and simple interface. It demonstrates state of the art of cryptology techniques, such as password hashing and salt. Ohcrypt also features self-extractable and self-destructive encrypted files
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Itilect FTP Proxy

    Itilect FTP Proxy

    Provide users with a managed temporary access to arbitary FTP

    This tool allows you to set proxied access for your users, using predefined FTP accounts. System works like this: Users connects to FTP proxy just like they do with a regular FTP, but using specially formed string as a username (string, that includes their internal profile name and desired target FTP) and their internal password. If they are allowed to access this host, proxy will establish connection with a target FTP and authenticate using real credentials. After that, server will act as...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    pam_duration

    Set limits on per-day total usage for Linux/Unix users

    pam_duration provides a module for the Pluggable Authentication Module (PAM) authorization framework that sets per-day limits on total usage by particular Linux/Unix users on a single system. Limits can be configured by day of the week, so, for example, weekend limits can be different from weekdays. It also provides a service to ensure logout when the specified time limit expires.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    SAMSON - Secure Authentication Modules

    SAMSON - Secure Authentication Modules

    Modules for remote attestation.

    The Secure Authentication Modules (SAMSON) are a set of modules designed to work together to provide a mechanism for doing remote authentication of a Linux system. It utilizes the IMA logic (introduced to the Linux kernel in 2.6.30) to perform a SHA-1 measurement of all executables prior to their being placed in execution, either as a program or as a memory mapped file mapped for execution. Utilizing the QUOTE feature of the TPM, it is possible to generate an Integrity measurement Report...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    textcrypter

    textcrypter

    textcrypter is an encryption tool using vigenere cipher algorithm

    Textcrypter is an encryption tool using vigenere cipher algorithm. Vigenere use the same key/password to encrypt and decrypt a file (symmetric key cryptosystem). Result of the encryption process is a ciphertext in hexa number.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    egrsa

    egrsa

    rsa-elgamal comparison

    compare time of process between rsa and elgamal algorithm used to encryption and digital signature.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    VPNCHAINS

    VPNCHAINS is bash script which chains vpn connections

    VPNCHAINS is bash script which chains openvpn connections. You don't need to use virtual machine for this anymore. After chain is completed you can use internet in more secure and private way with all openvpn benefits. Completed chain looks like this: PC <-> OPENVPN1 <-> OPENVPN2 <-> OPENVPN# <-> INTERNET
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19

    AnyHash

    A secure password solution for the modern, yet insecure world.

    A password manager that works without password file or cloud service. Just try it on the website.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    etherwall
    Etherwall is a free and open source network security tool that prevents Man in The Middle (MITM) through ARP Spoofing/Poisoning attacks. It Also prevent it from various attacks such as Sniffing, Hijacking, Netcut, DHCP Spoofing, DNS Spoofing, WEB Spoofing, and others. Note: For personal computer use only (client security) if you like this program, please give us your vote at http://sourceforge.net/projects/etherwall/reviews/
    Leader badge
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    SmartRouter Project
    SmartRouter Project A GNU/Linux Router, Firewall and Proxy Server
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    DAL4j

    Data Access Layer 4 Java

    Welcome to Data Access Layer for Java (DAL4j) a set of command line tools and framework used to reverse engineer a MySQL or SQLServer database schema into a set of JPA Entity Beans. DAL4j can be useful for scenarios where there is an existing database schema but a technology other that JPA is used to interact with the database. DAL4j can provide an easy way to migrate your code base from other technologies such as JDBC or Hibernate to JPA. The beans generated can be 1 or two types: Simple...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23

    Entropy Monitor

    Monitor of the available entropy stored within the Linux kernel

    In computing, entropy is the randomness collected by an operating system or application for use in cryptography or other uses that require random data. This randomness is often collected from hardware sources, either pre-existing ones such as mouse movements or specially provided randomness generators. Examples for applications that depend on entropy (random numbers) would be the fortune(6) program, which gives a random quote, or the solitaire card game, or the shuffle option in a music...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    MandelHash

    MandelHash

    MD5 hash used to position and color two overlaid Mandelbrot sets.

    I'm using an MD5 hash of a username and password field to generate some entropy which is used to generate color pallets and positions / scaling of two Mandelbrot sets. These two images are overlaid to create interesting pictures which represent the entered credentials. I'm interested in all things security, this is mostly just for fun, but could possibly be used to help users identify mistakes in their password entry prior to submission and enforce a tighter failed password lockout policy....
    Downloads: 2 This Week
    Last Update:
    See Project
  • 25

    AnalogIDS

    Snort log analyzer written in python

    ES: AnalogIDS es un analizador de logs de snort escrito en python que permite la generación de estadisticas de conexiones establecidas, protocolos y alertas de seguridad. Ademas permite generar gráficos de barra y pastel de las estadisticas. EN: AnalogIDS is a snort log analyzer written in python that allows the generation of statistics established connections, protocols and security alerts. You can generate bar graphs and pie statistics.
    Downloads: 0 This Week
    Last Update:
    See Project