Showing 82 open source projects for "time"

View related business solutions
  • Rezku Point of Sale Icon
    Rezku Point of Sale

    Designed for Real-World Restaurant Operations

    Rezku is an all-inclusive ordering platform and management solution for all types of restaurant and bar concepts. You can now get a fully custom branded downloadable smartphone ordering app for your restaurant exclusively from Rezku.
    Learn More
  • The Most Powerful Software Platform for EHSQ and ESG Management Icon
    The Most Powerful Software Platform for EHSQ and ESG Management

    Addresses the needs of small businesses and large global organizations with thousands of users in multiple locations.

    Choose from a complete set of software solutions across EHSQ that address all aspects of top performing Environmental, Health and Safety, and Quality management programs.
    Learn More
  • 1
    This tool encrypts text using polyalphabetic codetables, like the encryption systems in the middle ages. It can be used for simple text encryption with a small password or as a One-Time-Pad with a random codetable for 100% secure text encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Roots III Encryption is an encryption suite in Java and C++ backed by the strong normality of irrational roots. It can easily offer more than 2048 bit security, and can be seen as a practical one-time key implementation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    This is a simple password manager for java enabled mobile phones. It is supposed to work with all MIDP1 compatible devices. It has been around for a long time and no comatibility problems have been reported in the last few years. FreeSafe uses a TwoFish
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Encryption application using one time pad algoritm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • AestheticsPro Medical Spa Software Icon
    AestheticsPro Medical Spa Software

    Our new software release will dramatically improve your medspa business performance while enhancing the customer experience

    AestheticsPro is the most complete Aesthetics Software on the market today. HIPAA Cloud Compliant with electronic charting, integrated POS, targeted marketing and results driven reporting; AestheticsPro delivers the tools you need to manage your medical spa business. It is our mission To Provide an All-in-One Cutting Edge Software to the Aesthetics Industry.
    Learn More
  • 5
    Nikto FrontEnd (Nikto UI) is what we just wrap GUI to the all-time famous nikto.pl by Sullo (CIRT Inc).It usually takes several minutes(even hours) for a complete scan. When it's done, firefox will open and show the result.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    obov stands for OATH Based OTP validator. It's a 100% pure Java library that provides simple to use methods to validate (and related utilities) one time passwords generated by OATH compliant devices.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Penny Post
    Penny Post is a system to combat spam emails by making the sender "pay for email" by spending a few seconds of computing time. Outgoing mail is marked with postage stamps that convince the receiver that the sender is genuine.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    The Cookie-revolver framework provides J2EE web-applications with two-factor authentication security, “something I know” (userid/password) and “something I have” (encrypted one-time cookie).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    S/Key Generator. An RFC2289 compliant One-Time Password generator written in Java language and O.S. Thinlet package for GUI. It uses MD4 and MD5 hash algorithms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Skillfully - The future of skills based hiring Icon
    Skillfully - The future of skills based hiring

    Realistic Workplace Simulations that Show Applicant Skills in Action

    Skillfully transforms hiring through AI-powered skill simulations that show you how candidates actually perform before you hire them. Our platform helps companies cut through AI-generated resumes and rehearsed interviews by validating real capabilities in action. Through dynamic job specific simulations and skill-based assessments, companies like Bloomberg and McKinsey have cut screening time by 50% while dramatically improving hire quality.
    Learn More
  • 10
    Cryptomni is a program which can encrypt and decrypt files using the one-time pad cipher. If a key is truly random, kept secret, and never reused, this encryption algorithm can be proven to be unbreakable.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    S/Key - OTP Generator for J2ME architecture. An RFC2289 compliant One-Time Password generator for mobile phone supporting Java language. It uses MD4 and MD5 hash algorithms.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 12
    The PeerTrust system uses policies to describe trust and security requirements. Such policies are a component of Peertrust run-time system that can negotiate to establish trust among systems on the Semantic Web
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    An electronic votingsystem – Verifiable E-Voting (VEV) – with underlying protocol to help secure the election process from malicious practices at the same time as allowing voters and candidates to verify the correctness of their votes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    A library for accessing a Time Stamp Authority Server using both HTTP and TCP protocols. It implements RFC3161.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Uberviewer is a java/swt log processor for Uberlogger (a kernel-based observatory). It allows real-time analysis of a remote OS, including process and I/O monitoring. This tool is intended to be helpful for security researchers and malware analysts.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    SAM Jr provides real-time analysis of Snort data. SAM Jr is written in Java and should run anywhere a modern JVM is available. SAM Jr will be extendable via plugins so that custom actions can be written easily.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Please note: not having time to complete jSai myself; I came across the ACEGI project which I now recommend instead. jSai; a Servlet Authentication Implementation. jSai aims to allow easier to use, more powerful authentication for Java Servlets.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    jSmithy Single Sign On project. In just time containts only custom and LDAP/ActiveDirectory authorizations.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    A Java-based client-server architecture for processing network intrusion detection data. The server receives XML alerts from Snort sensors buffers them for review by clients. The console provides a real-time view of IDS activity.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Yet another alarms program with features as file modification alarm (maybe useful for security auditories), alarms file saving possibility and of course time and date alarms. This time written in java.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Manage sources of video (i.e., from a security camera), recording clips where motion has been detected, and allowing those clips to be replayed. Variable lead-in/out time, motion detection, logging.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    The JPass.org project relates to the development of a system for authenticating user's identity, more specifically, for providing identity authentication methods using non-reusable and non-reversible one-time IDs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    SyncShare Server is a secure messaging and real-time collaboration platform. Build solutions to connect people, data, and applications through firewalls and mobile devices. It handles all networking, security issues and lets one focus on the business
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Time-stamp of a created file can be modified by attacker. This project is meant to track File timestamp values , using NTFS data structures rather than trusting the original time stamp modified by attacker.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    SecureShareExample

    SecureShareExample

    EaseFilter File Secure Sharing Example

    ...Block forwarding, uploading to unauthorized cloud services, or syncing to personal drives. Apply time-based access (expiration dates) and geo/device restrictions. Maintain tamper-evident audit trails for compliance and forensics.
    Downloads: 0 This Week
    Last Update:
    See Project