Search Results for "sourceforge.net/projects/winpython/files/winpython_3.8/3.8.10.0/winpython64-3.8.10.0.7z" - Page 6

Showing 204 open source projects for "sourceforge.net/projects/winpython/files/winpython_3.8/3.8.10.0/winpython64-3.8.10.0.7z"

View related business solutions
  • Simplify Purchasing For Your Business Icon
    Simplify Purchasing For Your Business

    Manage what you buy and how you buy it with Order.co, so you have control over your time and money spent.

    Simplify every aspect of buying for your business in Order.co. From sourcing products to scaling purchasing across locations to automating your AP and approvals workstreams, Order.co is the platform of choice for growing businesses.
    Learn More
  • The Most Powerful Software Platform for EHSQ and ESG Management Icon
    The Most Powerful Software Platform for EHSQ and ESG Management

    Addresses the needs of small businesses and large global organizations with thousands of users in multiple locations.

    Choose from a complete set of software solutions across EHSQ that address all aspects of top performing Environmental, Health and Safety, and Quality management programs.
    Learn More
  • 1
    ConAlyzer (CONsistency anALYZER) is an experimental tool for finding inconsistencies between log files and file system metadata, implemented in Tcl/Tk. At present it only handles FTP log files produced by the Serv-U FTP server on the Windows platform.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    For system user to take backup of any confidential file(it may be code/important document)as it may contain content not meant for the others to view or the system may crash.We will be securing the backup of selected files at regular intervals of time.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    TSMtape allows recovery of files found on TSM v5.x (tested against 5.2) tapes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    The Encrypted File system will allow the users to encrypt and decrypt their files in FreeBSD with the enhanced features encryption process happening when the load on the CPU is low and the file attributes will also be encrypted.
    Downloads: 0 This Week
    Last Update:
    See Project
  • AestheticsPro Medical Spa Software Icon
    AestheticsPro Medical Spa Software

    Our new software release will dramatically improve your medspa business performance while enhancing the customer experience

    AestheticsPro is the most complete Aesthetics Software on the market today. HIPAA Cloud Compliant with electronic charting, integrated POS, targeted marketing and results driven reporting; AestheticsPro delivers the tools you need to manage your medical spa business. It is our mission To Provide an All-in-One Cutting Edge Software to the Aesthetics Industry.
    Learn More
  • 5
    Three software packages to work with RFC2617 digests: libdigest (C library to compute digests), libcppdigest (C++ library to manage /etc/passwd-like files) and libpam-digestfile (PAM module allowing authentication via an /etc/passwd-like file)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    GPGView is a front-end for GPG on Windows. It allows easy distribution password files among team members. Encryption should be done with GPG itself (command line), GPGView decrypts and presents the files to recipients.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    - DSI is a security framework addressing security needs of carrier-grade Linux clusters. - DigSig is a linux kernel module checking RSA signatures of ELF executables at run-time. **Those projects are no longer maintained**
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    A self contained cross platform utility for encrypting (and decrypting) files using AES 256 (and SHA 256) for secure transportation or privacy.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    Use prime numbers and pseudorandom number generators to create pseudorandom permutations to "shuffle" bits of given data (passwords, logins, PINs, files, directories). It is designed to be very secure (I hope so).
    Downloads: 0 This Week
    Last Update:
    See Project
  • Skillfully - The future of skills based hiring Icon
    Skillfully - The future of skills based hiring

    Realistic Workplace Simulations that Show Applicant Skills in Action

    Skillfully transforms hiring through AI-powered skill simulations that show you how candidates actually perform before you hire them. Our platform helps companies cut through AI-generated resumes and rehearsed interviews by validating real capabilities in action. Through dynamic job specific simulations and skill-based assessments, companies like Bloomberg and McKinsey have cut screening time by 50% while dramatically improving hire quality.
    Learn More
  • 10
    Al2 is a language, close to C++ and Java, designed for use in mathematics and science, but is procedural unlike Mathematica and Maple. Like C++, class operators can be defined. Like Java, there is no need for header files. Aled is an interface to AL2.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 11
    NOAHDB is a command line tool that parses the log files that are emitted by the Argos Honeypot and populates the tables of a MySQL database.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    This software is a set of tools that hides C source code in txt files. Also the software is able to restore the txt files to C source code again. This work is based on the tool c2txt2c by Leevi Martilla. Csteg needs a book file in txt format to hide C so
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    ccsrch is a tool that searches for and identifies unencrypted and contiguous credit card numbers (PAN) and track data on windows and UNIX operating systems. It will also identify the location of the PAN data in the files and record MAC times.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    Steganography program. Crypture encrypts (1024 bit key) and stores files in Windows bitmap files. Only 6 KB, with no install required. Fills all bits with noise, to slip by standard steganalysis methods. Data header is encrypted and scattered as well.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Generic file fuzzer. It has some "advanced" features like deep tracing into child child's and also it can "recognize" text format of the input files (if they are ASCII).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    stegotools is a suite of UNIX command-line applications to read/write hidden information from/in files using steganography. It currently fully supports 24bpp bitmap images.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 17
    alr-encrypt has moved to http://sourceforge.net/projects/encrypt
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Stegeek is very simple tool, that takes several files,encrypt, and mix them into one file. Also add some redundancy. The result is, that we have one archive and N keys. It should not be possible to guess N, if you have archive and up to N-1 keys.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    B-Trust eDoc is a program built on top of LibDigiDoc a free implementation of the OpenXAdES standard for signing/encrypting files using smartcard tokens. It also contains Openssl and PKCS11 wrapper classes in C++ which might be useful to developers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Simple HTTP Scanner is a creation made for web site pen testing. You can check for directories and files on the remote web server and get some server information like the webserver running and other skills.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    apGuard is very easy to use program which allows to automatize the process of setting permanent rights for files and directories (using the configuration file). Works on linux, and probably on other UNIX systems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Shade is a versatile LSB (least significant bit) manipulation and analysis tool used to hide/retrieve files from within other files, such as images. The goal is to make the existence of the hidden file completely undetectable, and optionally encrypted.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Eraser software for secure deletion of files and cleaning of free disk space with full functionality and lightweight GUI.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Bisker is a simple cgi scanner written in C language for GNU/linux platforms. It's an useful tool to find critical or dangerous cgis/folders/files on local and remote machines (also through proxy).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Iron Bars Shell is a restricted Unix shell. The user can not step out of, nor access files outside the home directory. It is written in C for Linux. No libraries used. It is small, fast, secure. Two ascii configuration files for more control.
    Downloads: 1 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB