[go: up one dir, main page]

Ada Security Software

View 5628 business solutions

Browse free open source Ada Security Software and projects below. Use the toggles on the left to filter open source Ada Security Software by OS, license, language, programming language, and project status.

  • Enterprise-Grade Monitoring - Zero Compromises Icon
    Enterprise-Grade Monitoring - Zero Compromises

    PRTG delivers deep visibility and proactive alerts for complex IT. Monitor, analyze, and optimize - all in one platform.

    Managing a large, distributed IT environment demands more than basic monitoring. PRTG provides a unified view of your entire infrastructure - across sites, clouds, and hybrid setups. Advanced analytics, customizable dashboards, and granular access controls empower your team to detect issues early and respond fast. Automate reporting, ensure compliance, and scale effortlessly as your network grows. With PRTG, you get reliability, flexibility, and the insights you need to keep your business running at peak performance.
    Start Your Free PRTG Trial
  • Download the most trusted enterprise browser Icon
    Download the most trusted enterprise browser

    Chrome Enterprise brings enterprise controls and easy integrations to the browser users already know and love.

    Chrome Enterprise is ideal for businesses of all sizes, IT professionals, and organizations looking for a secure, scalable, and easily managed browser solution that supports remote work, data protection, and streamlined enterprise operations.
    Learn More
  • 1
    RufasSlider

    RufasSlider

    Klotsky class block slider puzzles.

    RufaSlider is a collection of 16 different block slider puzzles for kids and casual puzzlers that works on laptops and PCs running Windows, OSX or GNU/Linux. It includes a Klotski-style family, a DirtyDozen family, and a Traffic-Rush family. And now these puzzle families come with AutoSolvers to help you. The Klotski family uses rectangles of 4 sizes: 1x1, 2x2, 1x2, 2x1. The objective in each game is stated near the window top, but usually involves moving a large block to a specified location within the window. The DirtyDozen family is similar except there are L-shaped puzzle pieces. The Traffic-Rush family uses data, with 2x1, 1x2, 3x1, 1x3 rectangles. Here, the long rectangles represent cars or trucks that can only move [roll] lengthwise...the goal being to move the red car toward the shaded "exit door". The proper command to extract the archive and maintain the directory structure is "7z x filename".
    Downloads: 4 This Week
    Last Update:
    See Project
  • 2
    The libadacrypt-dev is a slow crypto library for Ada with a nice API. It is written for the i386 hardware architecture and supports AES, Twofish, 3DES, Serpent SHA, Whirlpool DSA, OAEP-RSA, HMAC, RMAC... Dependencies: make and gnat.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    The Ada Cryptographic Framework (ACF) is a set of Ada packages that implement the most popular cryptographic algorithms. The main goal of the proyect is to implement a complete set of cryptographic primitives entirely in Ada 95
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Ada Cryptographic Objects (ACO) is an Ada library of cryptographic algorithms and related services.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Fully managed relational database service for MySQL, PostgreSQL, and SQL Server Icon
    Fully managed relational database service for MySQL, PostgreSQL, and SQL Server

    Focus on your application, and leave the database to us

    Cloud SQL manages your databases so you don't have to, so your business can run without disruption. It automates all your backups, replication, patches, encryption, and storage capacity increases to give your applications the reliability, scalability, and security they need.
    Try for free
  • 5
    Codegroup

    Codegroup

    A Java application for transferring computer files in 5 letter groups

    Codegroup is a Java application that will allow one to convert binary (or text) computer files in to 5 letter codegroups for transmission over email, landline telephones, radioteletype or Morse Code. Codegroup has internal error correction & limited cryptography capabilities. Codegroup : ZZZZZ YBPIL AIAIG FMOPP CPAAA DGNGP GPGPA ADNJN ELJKO ELIMO GEOHF KIFGP IFBCB PKCPI YJMHE PHBHP PPOBH NCOHD AKLLL AGHFP DEGEF LKELC EAIJI ABAGP AHPPO IHHPH OHPDF YNFPB ALEPO KMPKP Once this program has a graphical user interface, an Enigma like subsystem must be devised for data whitening. For content encryption, the use of Java's facilities is being considered as a long term option. This project's initial sourcecode is related to : http://www.fourmilab.ch/codegroup/ http://winmorse.com/ https://bitbucket.org/bgneal/cpp-enigma http://www.whence.com/minimodem/ For the User Interface http://www.oracle.com/technetwork/java/javafx/tools/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    MATTA

    MATTA

    Morse Code Utilitiies to convert text messages to & from sound files.

    This is a commandline utility that converts a WAV sound file containing morse code to English text. Pre-built binaries run on OSX, MsWindows, & GNU/linux. It is written in Ada, so can be rebuilt on any platform with an Ada compiler. The input wav file must be monaural, with a 16-bit signed integer encoding, and a sample rate of 8000 Hz. Either sox or audacity can easily transform to this format. The wav file is expected to be international morse code, preferrably clean and properly spaced. Tonal frequency or wpm-speed does not seem to matter. Now includes an inverse commandline app, txt2wav that creates a morse code WAV file from English text. The proper command to extract the archive and maintain the directory structure is "7z x filename".
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    OS based on Agent based Security with a new type of split kernel and agents platform.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    The Nexus Operating System is a planned, realtime multimedia operating system compliant with POSIX standards. Nexus is intended not to become the next fad; it is the OS all developers can develop for without losing market standing in other OS's.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    A formally verified implementation of cryptographic algorithms using the SPARK programming language. For the complete library proofs of the absence of run-time errors are available. Some of its subprograms include proofs of partial correctness.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Monitoring, Securing, Optimizing 3rd party scripts Icon
    Monitoring, Securing, Optimizing 3rd party scripts

    For developers looking for a solution to monitor, script, and optimize 3rd party scripts

    c/side is crawling many sites to get ahead of new attacks. c/side is the only fully autonomous detection tool for assessing 3rd party scripts. We do not rely purely on threat feed intel or easy to circumvent detections. We also use historical context and AI to review the payload and behavior of scripts.
    Learn More
  • 10
    x_Cleaner

    x_Cleaner

    Utility to sector-level cleaning your storage with special algorithm.

    x_Cleaner erases stored data using the following algorithms*: 1. Britain HMG IS5 - Base (one pass of writing 0x0) 2. Britain HMG IS5 - Enhanced (1-st pass 0x0, 2-nd pass 0x1 and 3-d pass - random values) 3. Russian GOST R-50739-95 (1-st pass 0x0, 2-nd pass-random values) 4. US DoD 5220.22-M(E) (1-st pass 0x0, 2-nd pass 0x1 and 3-d pass - random values) 5. Bruce Schneier's algorithm (1-st pass 0x1, 2-nd pass 0x0, 3-7 passes - random values) x_Cleaner works for Windows XP, Vista,7 and later versions. -- Important! Run x_Cleaner with administrative rights in order to clean non-removable media.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next