Showing 2 open source projects for "computer"

View related business solutions
  • Best Visitor Management System Icon
    Best Visitor Management System

    Instantly Notify Staff Of Deliveries And Guest Arrivals To Increase Your Efficiency

    <p class="mb-4">Do stacks of paperwork pile up at the front desk area? Or are your receptionists constantly filing reports, guest log-in information and NDAs – taking them away from other important tasks? Not anymore! Our Visitor Management System automates all these processes, streamlining your workflow. Guests can complete inductions, sign NDAs, fill in their contact details and much more using the easy software. These records are then automatically filed and stored, making life easy for receptionists and the HR team. Claim your FREE 7-day trial and experience how VisitUs can transform your workplace!</p>
    Try it Free
  • Dragonfly | An In-Memory Data Store without Limits Icon
    Dragonfly | An In-Memory Data Store without Limits

    Dragonfly Cloud is engineered to handle the heaviest data workloads with the strictest security requirements.

    Dragonfly is a drop-in Redis replacement that is designed for heavy data workloads running on modern cloud hardware. Migrate in less than a day and experience up to 25X the performance on half the infrastructure.
    Learn More
  • 1

    HashApp

    python software for cracking and creating SHA and MD5 hashes

    ...If you would like to change the online dictionary URL for hash decryption, use CTRL+F in your text editor and search for this line: LIST_OF_WORDS = str(urlopen('https://raw.githubusercontent.com/dwyl/english-words/master/words.txt').read(), 'utf-8') Change the url in the urlopen function and replace all instances with your version of the above line. If you want to use a txt dictionary stored in your computer, then, well, nothing. Unless the word search fails with the online dictionary, you can't use a txt dictionary. But don't worry; you just have to store your txt on github (like the default dictionary above).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    PyEvcs

    Extended Visual Cryptography Schemes in Python

    ...In a 2-out-of-2 Visual Cryptography Scheme a dealer will "split" a secret image into two shares, print the shares onto separate transparencies and hand them to the participants to the scheme. If the two participants come together, they'll be able to reveal the secret image without a computer, perfectly superimposing the transparencies they own. Analyzing a single share, no one will be able to obtain any information considering the secret image no matter the computing or the analyzing power. In an Extended Visual Cryptography Scheme, both the secret image and the shares are meaningful images like a landscape, a building or a beautiful girl, hiding the very intention to conceal a secret. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB