Showing 17 open source projects for "linux secure remix"

View related business solutions
  • Red Hat Ansible Automation Platform on Microsoft Azure Icon
    Red Hat Ansible Automation Platform on Microsoft Azure

    Red Hat Ansible Automation Platform on Azure allows you to quickly deploy, automate, and manage resources securely and at scale.

    Deploy Red Hat Ansible Automation Platform on Microsoft Azure for a strategic automation solution that allows you to orchestrate, govern and operationalize your Azure environment.
  • SKUDONET Open Source Load Balancer Icon
    SKUDONET Open Source Load Balancer

    Take advantage of Open Source Load Balancer to elevate your business security and IT infrastructure with a custom ADC Solution.

    SKUDONET ADC, operates at the application layer, efficiently distributing network load and application load across multiple servers. This not only enhances the performance of your application but also ensures that your web servers can handle more traffic seamlessly.
  • 1
    Borg

    Borg

    Deduplicating archiver with compression and encryption

    BorgBackup or Borg for short is a deduplicating backup program that also supports compression and authenticated encryption. It provides a secure and efficient way to backup data, and is ideal for daily backups and backups to not fully tested targets.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 2
    LibSecRm - Secure Removal Library

    LibSecRm - Secure Removal Library

    A library for secure deleting data on-the-fly

    LibSecRm (LIBrary for SECure ReMoval) is a set of replacements for these standard C functions which cause data removing from files. The data is first securely wiped on-the-fly, to protect the user's privacy, then the original functions are called. There is NO NEED to rebuild your software, because LibSecRm is a pre-loadable library, meaning you just need to RUN the software with LibSecRm loaded. LibSecRm is also a development library. The following wiping methods are supported: Gutmann...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    WipeFreeSpace

    WipeFreeSpace

    Secure wiping/shredding of free disk space with many methods

    WipeFreeSpace is a program to securely erase/wipe/overwrite/shred the free space on file systems WITHOUT DESTROYING EXISTING FILES, to prevent recovery of deleted sensitive data. This allows protecting the user's privacy when e.g. selling the drive or the whole computer. The following filesystems are supported: - Ext2/3/4, - NTFS, - XFS, - ReiserFSv3/4, - FAT12/16/32, - MinixFS1/2, - JFS, - HFS/HFS+, - OCFS. The following wiping methods are supported: Gutmann-like, random,...
    Leader badge
    Downloads: 39 This Week
    Last Update:
    See Project
  • 4

    littleutils

    Various small and useful command-line utilities

    The littleutils include duplicate file finders (repeats, repeats.pl, repeats.py), image optimizers (opt-jpg, opt-png, opt-gif, recomp-jpg), file rename tools (lowercase, uppercase, pren), archive recompressors (to-gzip, to-bzip2, to-bzip3, to-7zip, to-lzma, to-lzip, to-xz), a tempfile utility (tempname), file property tools (filedate, filemode, filenode, fileown, filesize, and lrealpath), and others. See the README file for more details.
    Downloads: 12 This Week
    Last Update:
    See Project
  • Business Continuity Solutions | ConnectWise BCDR Icon
    Business Continuity Solutions | ConnectWise BCDR

    Build a foundation for data security and disaster recovery to fit your clients’ needs no matter the budget.

    Whether natural disaster, cyberattack, or plain-old human error, data can disappear in the blink of an eye. ConnectWise BCDR (formerly Recover) delivers reliable and secure backup and disaster recovery backed by powerful automation and a 24/7 NOC to get your clients back to work in minutes, not days.
  • 5
    CliFM

    CliFM

    The command line file manager

    A file manager for the Unix terminal. Unlike most file managers out there, based on the TUI, CliFM is entirely based on command-line. It is also ultra-lightweight, lightning fast, extensible, and written in C.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 6

    DavUtils

    Powerful webdav client and sync tools with client-side AES encryption

    .... The integrated client-side AES encryption makes it secure to use public clouds.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    cyphertite

    cyphertite

    Secure, encrypted, zero-knowledge online data backup.

    Introducing Cyphertite 2.0: An all new look and feel in Windows! Cyphertite is a tar-like secure remote archiver. It deduplicates, compresses, and encrypts data prior to transmission, providing total privacy while reducing unnecessary wire traffic. It seamlessly supports IPv6 and IPv4 on a variety of platforms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Use of Michael Rabin's Information Dispersal Algorithm to provide secure, dispersed storage in a networked environment. For full download, please get both Math-FastGF2 and Crypt-IDA releases under the files link. See project wiki for more information.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    zerofill

    Fills unused space in a file system.

    Fills unused space in a file system with zero-bytes and overwrites unused inodes. Based on sfill from secure-delete by van Hauser / [THC], vh@thc.org, <http://www.thc.org>, simplified and with a few fixes added. Version: 0.5.1
    Downloads: 0 This Week
    Last Update:
    See Project
  • Make Recruiting and Onboarding Easy Icon
    Make Recruiting and Onboarding Easy

    Simple, easy-to-use applicant tracking and employee Onboarding system for any sized organization.

    Take away the pain and hassle associated with applicant recruitment, hiring, and onboarding with ApplicantStack. Designed for HR professionals and recruiters, ApplicantStack helps streamline the recruiting and onboarding processes to improve productivity and reduce costs. ApplicantStack provides a complete toolkit that includes tools for posting, launching, and advertising jobs, assessing and managing candidates, collaborating with teams, centralizing information for quick hiring and onboarding, and more.
  • 10
    A small program that allows the user to delete files in a secure manner.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    This is a more secure file encryption program which uses SERPENT cipher and WHIRLPOOL+SHA-256 hash functions in key creation and for integrity checking.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Secure Storage service is a set of tools to store in a secure way and in an encrypted format confidential data on the grid storage elements. The service has been designed for the grid Middleware of the EGEE infrastructure, gLite.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    fmac

    Adds a message authentication code (MAC) to a file

    A tiny command line program to create a secure file authentication code and verifier. This can be used to verify if a file has been altered or modified by a 3rd party.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    A simple system to perform backups to central backup server using SSH as tunnel and rsync as backend. Doesn't require any additional ports open (except SSH). All data goes through a secure crypted channel.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    This is a very powerfull criptography project that basicaly can be used to transmit or store secure data and study some cipher, hash and compression algorithms to understands how it works.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    OzVM is a simple, lightweight, secure virtual machine. The current target application of OzVM is OzStream, allowing platform-independent self-decoding data, which abstracts encoded data from client applications.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Licen is a multi platform permission backup tool. Permissions can be backed and restored up from hole networks as well as single workstations. Hence permissions have a big impact on computer security we are focusing on writing a very secure product.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next