Your top-rated shield against malware and online scams | Avast Free Antivirus
Browse and email in peace, supported by clever AI
Our antivirus software scans for security and performance issues and helps you to fix them instantly. It also protects you in real time by analyzing unknown files before they reach your desktop PC or laptop — all for free.
Free Download
Our Free Plans just got better! | Auth0
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
HashSum is a .NET port from GNU's md5sum and sha1sum. It supports: hash algorithm selection between MD5 and SHA1 (more could be added later) and compatibility between HashSum and GNU's checksum file format
Innovative text document search. http://dynaq.opendfki.de for details.
The goal of DynaQ is to develop an inquiry system to explore the personal information space, supporting you with the searching paradigm 'orienteering'. DynaQ is a (desktop)search engine with enhanced functionality for file, email and blog search.
Look at our GitLab homepage for sourcecode and documentation: http://dynaq.opendfki.de
If you have ever tried to locate files, classes, and resources buried amongst an ever shifting locus of ZIP and / or JAR files, we feel your pain!
After spending far too much time searching hundreds of archives for moving targets, I decided to write JarOMine.
Originally designed for locating Java classes, JarOMine works equally well with ZIP archives, too.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
... Encryption Standard) algorithm, which is a standard by U.S. National Institute of Standards and Technology (NIST), for protecting your personal data.
IMPORTANT: In order to run SafePassDB you need to have Java installed on your computer. Java is free and can be downloaded from - http://www.java.com/
This Java software is useful to set id3v1 and id3v2 tags on mp3 files, possibly in a massive way.
It helps you managing a song database, searching for duplicate songs.
It has a rename file utility, not only for mp3 files.
It has an utility panel to create playlists, re-organize files in folders with the name format you prefer, an utility to optimize the CD disk space.
This program was written in 2002, so I don't remember much about it ... but I used it a lot, as much as my close friends...
IOS6 and recent iTunes updates have broken a few features. We have made some partial fixes, but they are not complete. If you'd like to help support our development, or take over the development please let us know.
Explore the internal file structure of your iphone (or of a seized phone in the case of forensic teams) using either the iphone's own backup files or (for jail broken iphones) ssh. Viewing of plist, sqlite, and hex are supported. IOS 5 is now supported
iOS 6 only partially...
ShredBitz is a free and simple file shredder tool that can wipe selected files from any hard disk drive. ShredBitz is written in the java programming language and uses a custom written algorithm for shredding.
ShredBitz is a very powerful tool.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
SecureJDMS is the attempt to develop a secure DMS, based on an RCP and (even untrusted) DB for data storage. For now, its all about managing scanned documents and searching them by content (using OCR). All data sent and stored will be strongly encrypted.
A small utility written in Java that helps you extract songs from your iPod, by searching inside its hidden folders for the song, artist or album that you want.
Toke is a webmining toolkit for web exploring, indexing and searching for Java. Toke allows to you crawl public or private web sites, in order to create web estatistics, web Pajek graphs, Lucene indexs and word frequency files for data clustering.
JDiskCatalog is an OS independent program for cataloging CD and DVD collections. It allows for scanning disks and later browsing and searching the catalog.