6 projects for "input-leap" with 2 filters applied:

  • Compliant and Reliable File Transfers Backed by Top Security Certifications Icon
    Compliant and Reliable File Transfers Backed by Top Security Certifications

    Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.

    Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
    Start Free Trial
  • Earn up to 16% annual interest with Nexo. Icon
    Earn up to 16% annual interest with Nexo.

    Let your crypto work for you

    Put idle assets to work with competitive interest rates, borrow without selling, and trade with precision. All in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • 1
    OpenH264

    OpenH264

    Open Source H.264 Codec

    Cisco has taken their H.264 implementation and open-sourced it under BSD license terms. Development and maintenance will be overseen by a board from the industry and the open-source community. Furthermore, we have provided a binary form suitable for inclusion in applications across a number of different operating systems and made this binary module available for download from the Internet. We will not pass on our MPEG-LA licensing costs for this module, and based on the current licensing...
    Downloads: 64 This Week
    Last Update:
    See Project
  • 2
    BIP39-XOR

    BIP39-XOR

    Encrypt or decrypt 12, 15, 18, 21 or 24 BIP39 codewords array ("seed")

    Encrypt or decrypt 12, 15, 18, 21 or 24 BIP39 codewords array (so-called "seed phrase") using exclusive OR (XOR)/Vernam cipher (a.k.a. One Time Pad). If not input by a user, an encryption key is automatically generated at random. Encryption with such a key preserves integrity of BIP-39 checksums of all keys (that's distinct while also compatible with SeedXOR implementation).
    Downloads: 4 This Week
    Last Update:
    See Project
  • 3
    DNS-Based Host Blocking for Android

    DNS-Based Host Blocking for Android

    DNS-based Host Blocker (and lightweight ad blocker) for Android

    ...Items in the hosts and DNS servers lists can be moved around and removed) of the list using standard RecyclerView interactions (long press makes the entry movable, swipe to either side removes it). For hosts, a later entry overrides a previous entry; for DNS servers, the first server is preferred. There's also no validation of input, so DNS servers that are not valid IPv4 addresses are not rejected, neither are URLs for DNS server entries (we intend to support URLs in the future, so you can point the app to a remote list of servers).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    PermissionsDispatcher

    PermissionsDispatcher

    A declarative API to handle Android runtime permissions

    ...Annotate a method that explains why the permissions are needed. It passes in a PermissionRequest object which can be used to continue or abort the current permission request upon user input. Annotate a method that is invoked if the user doesn't grant the permissions. Annotate a method that is invoked if the user chose to have the device "never ask again" about permission. Now generated functions become much more concise and intuitive than Java version!
    Downloads: 1 This Week
    Last Update:
    See Project
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 5
    OpenSE(Open Secure Encoder)

    OpenSE(Open Secure Encoder)

    OpenSE - Secure your online transactions today!!

    ...Your computer's may suffer from the virus, trojan, key logger, rootkit or phishing attack, and all of your email contents are exposed. For which applications support the Secure Encoder, you are required to input the pin number which generates from your own Secure Encoder. Thus, you can avoid the lost. It's because your account is still protected even your username and password are stolen by the hacker. Enhancing the security level and protecting your account today!!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    iBox
    iBox is a powerful information management tools for Android, which gives you a safe and secure way to store all of your critical information. It could be credit card numbers, accounts, passwords, marketing plans, product ideas, minutes and much more.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB