Search Results for "sourceforge.net/projects/winpython/files/winpython_3.8/3.8.10.0/winpython64-3.8.10.0.7z" - Page 30

Showing 791 open source projects for "sourceforge.net/projects/winpython/files/winpython_3.8/3.8.10.0/winpython64-3.8.10.0.7z"

View related business solutions
  • 1
    TrustedPickle is a Python module which lets you create and sign your data files. By using public/private key techniques, this module protects your users from loading malicious data files that others might claim you created. LEGAL FOR EXPORT.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    This project is an attempt to design strongly typed langauge like C# or Java using capability security model. This is an reseach project. This project is also a temporary home for async-objects projects which is prototype of classes for asynchronous inte
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    RemenDeKO is a file repair program that you can use to generate off-line patch files to apply over damaged files. It's targeted for corrupted downloads, so the downloader just need to re-download a (probably) small file to fix the damaged download.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Steghide is a steganography program that is able to hide data in various kinds of image- and audio-files. The color- respectivly sample-frequencies are not changed thus making the embedding resistant against first-order statistical tests.
    Leader badge
    Downloads: 1,007 This Week
    Last Update:
    See Project
  • 5
    zssh (Zmodem SSH) is a program for interactively transferring files to/from a remote machine while using the secure shell (ssh). It is intended to be a convenient alternative to scp, avoiding the need to re-authenticate each time a file is transferred.
    Leader badge
    Downloads: 7 This Week
    Last Update:
    See Project
  • 6
    <b>IVJ MUD (Masive Multiplayer Text Game) is a SSL-based soft:<br>-Client (GUI)<br>-Server (GUI)<br>-Applet (GUI)<br>-Protocol (SSL-based, use of localization files that store strings to reduce trafic and allow for instant i18n.<br> LOOKING FOR HELP!</b
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    sha is a file hashing utility that uses the NIST's SHA-1, SHA-256, SHA-384, & SHA-512 hash algorithms. It can be used for file integrity checking, remote file comparisons, etc. The portable algorithm implementations can be useful in other projects too.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 8
    Picky - a selective syslog to mysql database daemon. Allows completely dynamic specific translation of syslog data to dynamic mysql table(s). The other projects under this one are tools that take advantage of the flexibility of Picky and demonstrate it
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Features of Cyberarmy.com brought direct to your desktop. They don't want it, so this projects kinda dead, wish I hadn't started it so early haha. Any ideas for an alternate purpose (not an IM client): jwinsatt@adelphia.net
    Downloads: 0 This Week
    Last Update:
    See Project
  • 10
    This is a program that watches your system log files, looking for hack attempts. It instanty reacts to potential security breaches by (for instance) adding firewall rules to cut off the attacker.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Line command cleaner/converter files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    pam_krb5 is designed to allow smooth integration of Kerberos 5 passwordchecking with applications built using PAM. It also supports session-specific ticket files (which are neater), Kerberos IV ticket file grabbing, and AFS token-grabbing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    IAN (I Am Normal) is used to minimize the chance of an attacker successfully fingerprinting a honeypot. This is accomplished by creating bogus data and history files, alter creation and modification times, add users, patch x number of programs, etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Tattoo will provide a set of command-line scripts for analyzing raw tcpdump files or ASCII hexadecimal representations of network traffic to identify format, function, and communication model.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Get your files crypted in easy way, absolutely non-painful. For Linux kernel.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Java class file encryption. Class Encrypt is a program that can encrypt a developer's class files and package them into an executable jar file for deployment. The program uses modules for implementing different encryptions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    A Python/Gtk application to manage groups of users stored in an LDAP database, using data from X509 certificates imported from files or LDAP servers maintained by certificate authorities. These groups are used to create grid-map files used by the Globus
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    The Secure Remote Log Monitor (SRLM) project provides client and server utilities that collect application or system log files from multiple systems over an untrusted network onto a central server for analysis and action.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    The NEO Project uses the NEO-c (Network Exchange Operation for Charity) platform to participate in various computing challenges and projects, and donates any winnings to the charities specified by its users.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Automated Computer Auditing Daemon - Keep a track of what's going on with your systems: suid, sgid, world writable, hidden and unowned files monitoring as well as important file's md5sums management audits sent to your mailbox on a regular basis.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Secure locate provides a secure way to index and quickly search for files on your system. It will also check file permissions and ownership so that users will not see files they do not have access to.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 22
    Knowngoods Report Generator is a set of shell scripts and a Makefile which generate plain text reports about modified files on your system. It does this by the use of checksum reference files which can be found at http://www.knowngoods.org/download.html f
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    A secure collaborative framework that is being used by other projects such as CFAgent (online customer service), CFWeb (pure HTTP communication for CFAgent) and much more in addition to serving as a standalone all-in-one collaboration platform by itself.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24
    Wonder who deleted that important file on your Linux box? Did your database files "mysteriously" disappear from that super-secure Linux database server and you don't know how? Now your system logs will tell who, what, when, and how with Auditunlink
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    ThorsenCode is a client-server system, that allows you and your buddies to share files in a safe way. It features encrypted filetransfers and encrypted chatrooms.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB