Manage what you buy and how you buy it with Order.co, so you have control over your time and money spent.
Simplify every aspect of buying for your business in Order.co. From sourcing products to scaling purchasing across locations to automating your AP and approvals workstreams, Order.co is the platform of choice for growing businesses.
Learn More
Rezku Point of Sale
Designed for Real-World Restaurant Operations
Rezku is an all-inclusive ordering platform and management solution for all types of restaurant and bar concepts. You can now get a fully custom branded downloadable smartphone ordering app for your restaurant exclusively from Rezku.
This project includes: 1 A php linux extension to include encrypted php source files - c; 2 A command line linux application to encrypt/decrypt php source files - c; 3 A windows application to encrypt/decrypt php source files - builder c++
platform independent solution to encrypt files on a portable Device. Files will be encrypted with TripleDES and hold in an XML-File. No local Installation needed.
The Cryptographic Implementations Analysis Toolkit (CIAT) is compendium of command line and graphical tools whose aim is to help in the detection and analysis of encrypted byte sequences within files (executable and non-executable).
Encrypti is a multi platform, easy to use encrypting tool for keeping your files secure. This application offers portability of encrypted files between various platforms. Secure your files with Encrypti!
This program allows to delete safely files on system Windows (Windows XP/Vista 32 bit). In program the opportunity of adjustment of key parameters such as cycles of filling in zero and cycles of filling is stipulated by random numbers.
CapPacketDecryptor is a MapleStory packet decrypting solution which reads .pcap files, decrypts the packets in them, and dumps them to another .pcap file, while reconstructing TCP information.
Failed Payment Recovery for Subscription Businesses
For subscription companies searching for a failed payment recovery solution to grow revenue, and retain customers.
FlexPay’s innovative platform uses multiple technologies to achieve the highest number of retained customers, resulting in reduced involuntary churn, longer life span after recovery, and higher revenue. Leading brands like LegalZoom, Hooked on Phonics, and ClinicSense trust FlexPay to recover failed payments, reduce churn, and increase customer lifetime value.
For system user to take backup of any confidential file(it may be code/important document)as it may contain content not meant for the others to view or the system may crash.We will be securing the backup of selected files at regular intervals of time.
File Crypter is a Simple program, that is able to encrypt your files and decrypt them. A version of File Crypter is included as an example in the xCrypter Library and is called "ncrypter" which is short for "new crypter".
StegSharp is an application built on C# 2.0 that explains the basic principles of steganography. With StegSharp the user can hide and recover text or files from image files. Supported image extensions are: jpeg and bmp.
NetBeans, pure Java. The Cryppie can protect your files by encrypting its content, possibility to compress files before encryption. It's destination for keep information in safe on your flash drive or another storage.
Fsum Frontend is a files integrity checker. It can calculate 96 hash and checksum algorithms(CRC32, MD5, SHA1, SHA2, ADLER, DHA256, FORK256, ...). You can verify your files using a .sfv/.md5/.sha1/.sha2 file or create your own checksum file.
EasyVote is a new easy to use, secure and transparent cryptographic online voting scheme for small elections (up to 500 voters).
The project contains the PHP files necessary to set up the server as well as the management tools.
mp3stegz is an application that apply steganographic (steganography) algorithm in mp3 files. mp3stegz will maintain original mp3 file's size and sound quality. The hidden message is compressed(zlib) and encrypted(Rijndael).
GPGView is a front-end for GPG on Windows. It allows easy distribution password files among team members. Encryption should be done with GPG itself (command line), GPGView decrypts and presents the files to recipients.
A Cryptography php module very easy to use, could be used to protect databases, files, ad hash codes in every server that support php. Nowdays the most used hash algoritms are weak and there are many huge database with the hash code and the relative pass
A random number generator based on data from human interface devices. A trayicon that provides access to the generated data in various data ouput formats: Guids, Passwords, Files etc. Future goal is build-in P2P exchange of gathered data.
This application aims to be a simple, small and portable enrypter which encrypts any number of files of any size quickly but securely. It also preserves file extensions which are encrypted with the file and handles ANY file type.
Use prime numbers and pseudorandom number generators to create pseudorandom permutations to "shuffle" bits of given data (passwords, logins, PINs, files, directories). It is designed to be very secure (I hope so).
Al2 is a language, close to C++ and Java, designed for use in mathematics and science, but is procedural unlike Mathematica and Maple. Like C++, class operators can be defined. Like Java, there is no need for header files. Aled is an interface to AL2.
Cypher is an encryption program that uses the AES (Rijndael) algorithm to encrypt and decrypt files. You can use Cypher to protect sensitive data from unwanted access.