Showing 9 open source projects for "loop-aes"

View related business solutions
  • Revolutionize Employee Time Tracking with Touch-Free Biometric Technology Icon
    Revolutionize Employee Time Tracking with Touch-Free Biometric Technology

    Transform Any Tablet into a Sophisticated, Face Recognition Time Clock

    Simplify and modernize your time tracking with a touch-free solution. Say goodbye to costly, tiny screens and embrace quick, accurate, and secure time management.
  • Total Network Visibility for Network Engineers and IT Managers Icon
    Total Network Visibility for Network Engineers and IT Managers

    Network monitoring and troubleshooting is hard. TotalView makes it easy.

    This means every device on your network, and every interface on every device is automatically analyzed for performance, errors, QoS, and configuration.
  • 1
    jrnl

    jrnl

    Collect your thoughts and notes without leaving the command line

    Collect your thoughts and notes without leaving the command line. jrnl has a natural-language interface so you don't have to remember cryptic shortcuts when you're writing down your thoughts. Your journals are stored in plain-text files that will still be readable in 50 years when all your fancy iPad apps will have gone the way of the Dodo. Encrypt your journals with industry-strength AES encryption. The NSA won't be able to read your dirty secrets. Sync your journals with Dropbox and capture...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Process Component

    Process Component

    The Process component executes commands in sub-processes

    ... the new output since the last call. The clearOutput() method clears the contents of the output and clearErrorOutput() clears the contents of the error output. You can also use the Symfony\Component\Process\Process class with the for each construct to get the output while it is generated. By default, the loop waits for new output before going to the next iteration
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    SSHTOOLS

    SSHTOOLS

    Java SSH API

    This project now hosts the third-generation of Java SSH API, Maverick Synergy. This API builds on the Maverick Legacy commercial APIs and delivers a new API in a unified client/server framework. This API is available to the community under the LGPL open source license. This update includes ed25519 support, support for the new OpenSSH private key file format and stronger key exchange algorithms. The project continues to host both the original API and legacy applications created around it,...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 4
    WiTTY

    WiTTY

    Java based SSH and SFTP (SCP) GUI client with smart functionalities

    A smart and easy way to manage SSH and SFTP connections for test and production environments. The project is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 License.
    Downloads: 0 This Week
    Last Update:
    See Project
  • ConnectWise Cybersecurity Management for MSPs Icon
    ConnectWise Cybersecurity Management for MSPs

    Software and support solutions to protect your clients’ critical business assets

    ConnectWise SIEM (formerly Perch) offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see beyond your network traffic. Our team of threat analysts does all the tedium for you, eliminating the noise and sending only identified and verified treats to action on. Built with multi-tenancy, ConnectWise SIEM helps you keep clients safe with the best threat intel on the market.
  • 5
    Putty SSH Commander

    Putty SSH Commander

    Quickly, simultaneously issue SSH commands to multiple Linux machines

    Now you can quickly, simultaneously issue SSH commands to multiple UNIX servers from Windows. Host names, IP addresses and AES encrypted/Base64 encoded passwords come from a configuration file, dynamically creating GUI labels. Great, fast, SOA tool.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Putty Terminal Deployer

    Putty Terminal Deployer

    Easily open multiple SSH login terminals to Linux servers

    PuTTY Terminal Deployer allows dynamic PuTTY secure shell (SSH) logins to multiple UNIX servers. Host, IP addresses and AES encrypted/Base64 encoded passwords are read from a configuration file. All GUI labels are created dynamically from this info.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    steganoroute

    steganoroute

    Send steganographed text messages to mtr with fake hops in the network

    Steganoroute is a tool to send steganographed text messages to another computer over the network. The receiver must make a traceroute to the sender using the mtr program (and pressing 'd' once to switch the display mode to the continuous graph). This tool, the sender, creates several fake hops and makes them answer the ICMP packets (or not) to write the letters one by one on the mtr client screen.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    When debug kernel driver, sometimes the kernel maybe involve loop statue so that shell can’t work. I define a new protocol based on icmp and implement server and client.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    vtwatch automatically switches the active virtual console on your Linux system in a loop, acting as a virtual terminal surveillance monitor. Includes switch-speed control, search strings, and more
    Downloads: 0 This Week
    Last Update:
    See Project
  • Cyber Risk Assessment and Management Platform Icon
    Cyber Risk Assessment and Management Platform

    ConnectWise Identify is a powerful cybersecurity risk assessment platform offering strategic cybersecurity assessments and recommendations.

    When it comes to cybersecurity, what your clients don’t know can really hurt them. And believe it or not, keep them safe starts with asking questions. With ConnectWise Identify Assessment, get access to risk assessment backed by the NIST Cybersecurity Framework to uncover risks across your client’s entire business, not just their networks. With a clearly defined, easy-to-read risk report in hand, you can start having meaningful security conversations that can get you on the path of keeping your clients protected from every angle. Choose from two assessment levels to cover every client’s need, from the Essentials to cover the basics to our Comprehensive Assessment to dive deeper to uncover additional risks. Our intuitive heat map shows you your client’s overall risk level and priority to address risks based on probability and financial impact. Each report includes remediation recommendations to help you create a revenue-generating action plan.
  • Previous
  • You're on page 1
  • Next