Open Source BASIC Security Software

BASIC Security Software

View 5020 business solutions

Browse free open source BASIC Security Software and projects below. Use the toggles on the left to filter open source BASIC Security Software by OS, license, language, programming language, and project status.

  • Video interviewing software and assessments to help you gain an advantage by hiring the right talent Icon
    Jobma's cloud-based Video Interviewing solution increases your teams productivity, flexibility and creates a great candidate experience which will bring your hiring team and talent closer together by breaking down the barriers of time and location. Using Jobma you can setup Pre-recorded & Live Video Interviews. Our video interviewing increases your recruiter productivity and improves your candidate experience. Jobma offers free ATS Integrations and is available in 14 languages.
  • Solve Your Real-world Business Challenges From A Single Timesheet With Powerful Built In Integration Icon
    TimeControl is a multi-purpose timesheet system designed to serve both Finance and Project Management. TimeControl has been designed to serve many purposes simultaneously. TimeControl tracks time on a task-by-task, project-by-project basis. Yet, despite its project-based controls, it remains a financial timesheet with all the controls necessary to fulfill the stringent needs of payroll, human resources, billing and finance. TimeControl is available both for subscription in the cloud or for purchase for an on premise installation and includes both a browser interface and the free TimeControl Mobile App for iOS and Android devices.
  • 1
    PasswordBox

    PasswordBox

    A console-mode program that will keep all your passwords safe

    PasswordBox is a console-mode program that will keep all your passwords safe, in an encrypted database protected by a master password. PasswordBox can also be used to generate secure (random) passwords. This program is written by Mateusz Viste, and uses the AES implementation of Chris Brown to handle all encryption/decryption processes. PasswordBox is available for the following operating systems: DOS, Windows, Linux. Remember, that if you forget your master password, you will have no way to recover the database content. Usage: pbox [--help] [--dump] --help displays a help screen (any unsupported parameter will display it, too) --dump lists all the data of your encrypted database onscreen
    Downloads: 3 This Week
    Last Update:
    See Project
  • 2
    This project is based off of Sam Rape. The final product is a bootable floppy which copies the sam file, compresses it and puts it on a disk. A detailed description can be found at datastronghold.com/archive/t10429.html
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    A simple applicatrion to calculate a Random Password starting from mouse movements.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Beautifully simple experience with RMM, remote support, help desk, billing and reporting in one affordable platform. Icon
    Atera is an IT Management interface that provides the summit of solutions for MSPs. This leading-edge, cloud-based program offers Remote Monitoring & Management, Remote Access & Support, Technician-Based Pricing, and Professional Services Automation.
  • 5

    MLCrypt

    Simple, lightweight, standalone command-line single file encryption.

    Simple, lightweight, cross-platform (Windows / Linux / ARM6 Linux), cross-arch (x32 / x64), standalone command line file encryption program. GnuPG is probably the best application for cross-platform encryption. However, its usage on Windows PCs may be inconvenient (installation administrator rights; large executable size for perhaps just a one-time file decryption, complicated command-line switches for stronger encryption). NCrypt would fulfill this task, but does not operate on 64-bit Windows - MLCrypt was created because of this. The program's primary aim is cascade encryption: create an encrypted outer layer over an existing compressed and encrypted archive file. (Each encryption layer should have a different complex password.) MLCrypt.zip contains all the executables: Linux, Windows, Raspberry Pi.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    A Macro for viewing and removing metadata and hidden data from OpenOffice.org Writer documents.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    Predator encryption

    Small encryption

    I wrote this in 1997. Right now I have the basic code up. I have it in c++ too but I have yet to upload it. This program is good for small files but does not handle large files very well. It creates a binary key to increase the entropy of your file. It can use the key to reverse the entropy of your file. So, it encrypts and de-crypts.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    It's a program who encript all files on two steps. Infinit passwords. The files have got the exactly size who before (in the mode A).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    An extremely versatile neural net. Hopefully.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Analyze and gain insights into the current state of your data. Icon
    Analyze and gain insights into the current state of your data.

    Built on a modular architecture, OpenDQ scales with your enterprise data management needs.

    Infosolve’s Zero Based Solutions provide clients with comprehensive data solutions that leverage the power of their enterprise data to achieve their business objectives and create strategic opportunities-- without the burdens of cumbersome licensing agreements, complex term contracts and expensive hardware requirements. Infosolve Technologies embodies its Zero Based Solutions in every project with the Zero defect data guarantee, assuring that all results are free from new data errors and inconsistencies.
  • 10
    Free pc protection; prevents malicious software attacking your pc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    A smart card-based public key cryptography system based on elliptic curves, using AES for session key generation and SHA for hashing. This project will include the smart card software, terminal software, and a public key server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next