Nothing Special   »   [go: up one dir, main page]

Open Source Ada Security Software

Ada Security Software

View 5251 business solutions

Browse free open source Ada Security Software and projects below. Use the toggles on the left to filter open source Ada Security Software by OS, license, language, programming language, and project status.

  • Try the Best Value-for-Money Remote Support Software Icon
    Try the Best Value-for-Money Remote Support Software

    Provide instant attended or unattended remote assistance to your teams or clients without breaking your budget!

    TSplus Remote Support enables support agents and maintenance teams to provide instant, attended or unattended remote access from/to Windows and macOS PCs, at a price that won’t break your IT budget. Support agents can securely access remote computers, take control of their mouse and keyboard, access files and applications, and troubleshoot problems. The ideal solution for IT professionals to deliver internal maintenance and for customer support teams to assist remote clients.
    Start Free Trial
  • Our Free Plans just got better! | Auth0 by Okta Icon
    Our Free Plans just got better! | Auth0 by Okta

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
    Try free now
  • 1
    RufasSlider

    RufasSlider

    Klotsky class block slider puzzles.

    RufaSlider is a collection of 16 different block slider puzzles for kids and casual puzzlers that works on laptops and PCs running Windows, OSX or GNU/Linux. It includes a Klotski-style family, a DirtyDozen family, and a Traffic-Rush family. And now these puzzle families come with AutoSolvers to help you. The Klotski family uses rectangles of 4 sizes: 1x1, 2x2, 1x2, 2x1. The objective in each game is stated near the window top, but usually involves moving a large block to a specified location within the window. The DirtyDozen family is similar except there are L-shaped puzzle pieces. The Traffic-Rush family uses data, with 2x1, 1x2, 3x1, 1x3 rectangles. Here, the long rectangles represent cars or trucks that can only move [roll] lengthwise...the goal being to move the red car toward the shaded "exit door". The proper command to extract the archive and maintain the directory structure is "7z x filename".
    Downloads: 3 This Week
    Last Update:
    See Project
  • 2
    MATTA

    MATTA

    Morse Code Utilitiies to convert text messages to & from sound files.

    This is a commandline utility that converts a WAV sound file containing morse code to English text. Pre-built binaries run on OSX, MsWindows, & GNU/linux. It is written in Ada, so can be rebuilt on any platform with an Ada compiler. The input wav file must be monaural, with a 16-bit signed integer encoding, and a sample rate of 8000 Hz. Either sox or audacity can easily transform to this format. The wav file is expected to be international morse code, preferrably clean and properly spaced. Tonal frequency or wpm-speed does not seem to matter. Now includes an inverse commandline app, txt2wav that creates a morse code WAV file from English text. The proper command to extract the archive and maintain the directory structure is "7z x filename".
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    The libadacrypt-dev is a slow crypto library for Ada with a nice API. It is written for the i386 hardware architecture and supports AES, Twofish, 3DES, Serpent SHA, Whirlpool DSA, OAEP-RSA, HMAC, RMAC... Dependencies: make and gnat.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    The Ada Cryptographic Framework (ACF) is a set of Ada packages that implement the most popular cryptographic algorithms. The main goal of the proyect is to implement a complete set of cryptographic primitives entirely in Ada 95
    Downloads: 0 This Week
    Last Update:
    See Project
  • Multi-Tenant Analytics Software Built for Development Teams Icon
    Multi-Tenant Analytics Software Built for Development Teams

    Qrvey is the only solution for embedded analytics with a built-in data lake.

    Qrvey saves engineering teams time and money with a turnkey solution connecting your data warehouse to your SaaS application.
    Try Developer Playground
  • 5
    Ada Cryptographic Objects (ACO) is an Ada library of cryptographic algorithms and related services.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Codegroup

    Codegroup

    A Java application for transferring computer files in 5 letter groups

    Codegroup is a Java application that will allow one to convert binary (or text) computer files in to 5 letter codegroups for transmission over email, landline telephones, radioteletype or Morse Code. Codegroup has internal error correction & limited cryptography capabilities. Codegroup : ZZZZZ YBPIL AIAIG FMOPP CPAAA DGNGP GPGPA ADNJN ELJKO ELIMO GEOHF KIFGP IFBCB PKCPI YJMHE PHBHP PPOBH NCOHD AKLLL AGHFP DEGEF LKELC EAIJI ABAGP AHPPO IHHPH OHPDF YNFPB ALEPO KMPKP Once this program has a graphical user interface, an Enigma like subsystem must be devised for data whitening. For content encryption, the use of Java's facilities is being considered as a long term option. This project's initial sourcecode is related to : http://www.fourmilab.ch/codegroup/ http://winmorse.com/ https://bitbucket.org/bgneal/cpp-enigma http://www.whence.com/minimodem/ For the User Interface http://www.oracle.com/technetwork/java/javafx/tools/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    OS based on Agent based Security with a new type of split kernel and agents platform.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    The Nexus Operating System is a planned, realtime multimedia operating system compliant with POSIX standards. Nexus is intended not to become the next fad; it is the OS all developers can develop for without losing market standing in other OS's.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    A formally verified implementation of cryptographic algorithms using the SPARK programming language. For the complete library proofs of the absence of run-time errors are available. Some of its subprograms include proofs of partial correctness.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Manage printing in a cost-efficient and eco-friendly way with Gelato. Icon
    Manage printing in a cost-efficient and eco-friendly way with Gelato.

    Gelato offers an extensive catalog of custom products, a zero-inventory business model, and free designing tools—all in one place.

    The world's largest print on demand network with 140+ production partners across 32 countries. Gelato offers end-to-end design, production and logistics for individuals looking to start their own business today!
    Sign up for Free
  • 10
    x_Cleaner

    x_Cleaner

    Utility to sector-level cleaning your storage with special algorithm.

    x_Cleaner erases stored data using the following algorithms*: 1. Britain HMG IS5 - Base (one pass of writing 0x0) 2. Britain HMG IS5 - Enhanced (1-st pass 0x0, 2-nd pass 0x1 and 3-d pass - random values) 3. Russian GOST R-50739-95 (1-st pass 0x0, 2-nd pass-random values) 4. US DoD 5220.22-M(E) (1-st pass 0x0, 2-nd pass 0x1 and 3-d pass - random values) 5. Bruce Schneier's algorithm (1-st pass 0x1, 2-nd pass 0x0, 3-7 passes - random values) x_Cleaner works for Windows XP, Vista,7 and later versions. -- Important! Run x_Cleaner with administrative rights in order to clean non-removable media.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next