Showing 14 open source projects for "privacy for windows"

View related business solutions
  • Event Management Software Icon
    Event Management Software

    Ideal for conference and event planners, independent planners, associations, event management companies, non-profits, and more.

    YesEvents offers a comprehensive suite of services that spans the entire conference lifecycle and ensures every detail is executed with precision. Our commitment to exceptional customer service extends beyond conventional boundaries, consistently exceeding expectations and enriching both organizer and attendee experiences.
  • EBizCharge Payment Platform for Accounts Receivable Icon
    EBizCharge Payment Platform for Accounts Receivable

    Getting paid has never been easier.

    Don’t let unpaid invoices limit your business’s growth. EBizCharge plugs directly into the tools your business already uses to speed up payment collection.
  • 1
    Blokada Apps

    Blokada Apps

    Repo for Blokada apps

    Blokada is the popular ad blocker and privacy app for Android and iOS. It's being supported and actively developed by the amazing open-source community. Our modern solution for mobile content blocking. Protect multiple devices from ads and tracking, and manage your preferences in one place. Enjoy zero battery drain, no noticeable slowdowns, and highly reliable adblocking. If you want to efficiently block ads, trackers, malware, save on your data plan, speed up your device and protect your...
    Downloads: 14 This Week
    Last Update:
    See Project
  • 2
    Pi-hole

    Pi-hole

    A black hole for Internet advertisements

    ... for interoperability. Beautiful responsive Web Interface dashboard to view and control your Pi-hole. Can optionally function as a DHCP server, ensuring all your devices are protected automatically. Capable of handling hundreds of millions of queries when installed on server-grade hardware. Blocks ads over both IPv4 and IPv6. Open source software that helps ensure you are the sole person in control of your privacy.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 3
    HiddenVM

    HiddenVM

    HiddenVM — Use any desktop OS without leaving a trace

    If at any time Tails pushes an unexpected update, and HiddenVM is not yet updated for it, and you are stuck with a new Tails and no working HiddenVM version, you can re-download and temporarily use an earlier version of Tails until HiddenVM is updated. There are archived direct HTTP download mirrors of Tails images, archived official torrents with PGP signatures, or third-party archives at linuxtracker.org or fosstorrents.com, etc. (Always verify third-party torrents with archived official...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 4
    OSCAL

    OSCAL

    Open Security Controls Assessment Language (OSCAL)

    NIST is developing the Open Security Controls Assessment Language (OSCAL), a set of hierarchical, XML-, JSON-, and YAML-based formats that provide a standardized representation of information pertaining to the publication, implementation, and assessment of security controls. OSCAL is being developed through a collaborative approach with the public. Public contributions to this project are welcome. With this effort, we are stressing the agile development of a set of minimal formats that are...
    Downloads: 3 This Week
    Last Update:
    See Project
  • Precoro helps companies spend smarter Icon
    Precoro helps companies spend smarter

    Fully Automated Process in One Tool: From Purchase Orders to Budget Control and Reporting.

    For minor company expenses, you might utilize a spend management solution or track everything in spreadsheets. For everything more, you'll need Precoro. We help companies achieve procurement excellence and budget efficiency by building transparent, predictable, automated spending workflows.
  • 5
    Robolinux

    Robolinux

    MAX Privacy with Robolinux R12.12

    All 3 Robolinux Desktop versions come with new login and grub boot splash screens & LibreWolf browser which has the highest privacy! LibreWolf is a fork of Firefox so you can use its data. The Legacy Bios isos only work in VM's & Non UEFI PC's. Don't miss 50% Off 12+ price only $59.95 Expires Sept 30 2024 The 12+ Sale details Robo UNTRACKER Custom Installer FREE! Save $40 FAAST Boot Custom Installer FREE! Save $40 Backdoor security Custom Installer FREE! Save $40 12 Advanced...
    Leader badge
    Downloads: 114 This Week
    Last Update:
    See Project
  • 6
    Open Crypto Tracker

    Open Crypto Tracker

    Bitcoin Alts portfolio tracker, email / text / alexa / telegram alerts

    100% FREE / open source / PRIVATE cryptocurrency portfolio tracker. Email / text / alexa / telegram price alerts, price charts, mining calcs, leverage / gain / loss / balance stats, news feeds +more. Privately track Bitcoin / Ethereum / unlimited cryptocurrencies. Customize as many assets / markets / alerts / charts as you want. Over 40 Exchanges / 20 Trading Pairs Supported (exchanges / pairings list at bottom of README.txt): https://tinyurl.com/ct-readme Nearly Unlimited Assets...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 7
    NebiOS Alternative Mirror (Official)

    NebiOS Alternative Mirror (Official)

    An Ubuntu-based Linux distribution that aims to end user.

    NEBIOS 3 IS OUT NOW! Official NebiOS alternative mirror. You can use here if you have issues when downloading the NebiOS from official site. PLEASE DON'T DOWNLOAD NEBIOS FROM UNKNOWN SOURCES! NebiOS is an Ubuntu Linux-based secure, privacy-respectful, universal operating system for your daily life, enterprise, gaming that can replace macOS and Windows. Mininum System Requirements: - 64-bit 1.5 GHz 2-core x86 (Intel/AMD) or ARM (any ARM including Apple M1/M2/M3) CPU. - 2 GB RAM...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    Naeon

    Naeon

    The safest way to store private data in untrusted (cloud) environments

    Naeon is a secure cloud storage solution that uses unbreakable military-grade encryption and zero-knowledge privacy to protect confidential data in an untrusted environment. The data are encrypted using the AES 256-bit encryption algorithm with a randomly generated 128-character passphrase. Then, it is split into small pieces called chunks, which are obfuscated by adding random data to each chunk to make them unreadable and indecipherable to unauthorized individuals or processes...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Mastering the Lightning Network

    Mastering the Lightning Network

    Mastering the Lightning Network (LN)

    Mastering the Lightning Network is an O'Reilly Media book, by authors Andreas M. Antonopoulos (@aantonop), Olaoluwa Osuntokun (@roasbeef), Rene Pickhardt (@renepickhardt). It was published on Dec 21, 2021, in paperback and e-book, by O'Reilly Media. It is available everywhere that books are sold. This repository contains the manuscript of the book as published by O'Reilly Media, tagged as firstedition_firstprint. The book describes the Lightning Network (LN), a Peer-to-Peer protocol running...
    Downloads: 2 This Week
    Last Update:
    See Project
  • Gain insights and build data-powered applications Icon
    Gain insights and build data-powered applications

    Your unified business intelligence platform. Self-service. Governed. Embedded.

    Chat with your business data with Looker. More than just a modern business intelligence platform, you can turn to Looker for self-service or governed BI, build your own custom applications with trusted metrics, or even bring Looker modeling to your existing BI environment.
  • 10
    RaspiBolt

    RaspiBolt

    Bitcoin & Lightning full node on a Raspberry Pi

    Build your own “do-everything-yourself” Bitcoin full node that will make you a sovereign peer in the Bitcoin and Lightning network. With this guide, you can set up a Bitcoin and Lightning node from scratch, doing everything yourself. You will learn about Linux, Bitcoin, and Lightning. As a result, you’ll have your very own RaspiBolt node, built by you and no one else. Let your node validate your own Bitcoin transactions. No need to ask someone else to tell you what’s happening in the Bitcoin...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Whoami Project

    Whoami Project

    Enhanced privacy, anonymity for Debian and Arch based distributions

    In its simplest and shortest definition, Whoami is a user-friendly privacy/anonymity tool with its ease of use and simple interface. Whoami uses 9+ different modules to ensure the highest possible level of anonymity also solves possible problems without disturbing you with the Bug fixer module, which is in development.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Bitcoin Black Core

    Bitcoin Black Core

    BLACK use peer-to-peer technology to operate with no central authority

    Bitcoin Black Core is a peer-to-peer electronic cash system that aims to become sound global money with fast payments, micro fees, privacy, and high transaction capacity (big blocks). In the same way that physical money, such as a dollar bill, is handed directly to the person being paid, Bitcoin Black Core payments are sent directly from one person to another. As a permissionless, decentralized cryptocurrency, Bitcoin Black Core requires no trusted third parties and no central bank. Unlike...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    Whonix

    Whonix

    Whonix is an Anonymous Operating System.

    THIS IS NOT WHONIX'S HOMEPAGE. Please go to: https://www.whonix.org/ (This is only Whonix's sourceforge must-have project page.) Whonix is an operating system focused on anonymity, privacy and security. It's based on the Tor anonymity network, Debian GNU/Linux and security by isolation. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP. Whonix consists of two parts: One solely runs Tor and acts as a gateway, which we call Whonix...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Internet Account Replication (IAR)

    Internet Account Replication (IAR)

    Replicates POSIX user credentials over the Internet - NIS replacement

    Internet Account Replication (IAR) replicates POSIX user credentials between hosts. It is like NIS, but it: * Is really easy to use -- it practically works out of the box; * Works over the Internet -- it is compatible with regular firewalls; and, * Uses SSH to encrypt the data-flow It relies upon GNU nsswitch.conf (in glibc) for integration. GNU GPL 3 licensed.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next