Javascript required
Skip to content Skip to sidebar Skip to footer

Pintos Project 3 Design Document Solution

124 programs for "pintos project 3" with 2 filters applied:

  • TruGrid secures RDP without VPN Icon

    TruGrid secures RDP without VPN

    TruGrid prevents ransomware attacks between remote employee and company networks. TruGrid works with no open firewall ports.

    TruGrid secures and simplifies corporate-wide access to Enterprise Workspaces that are based on Microsoft Remote Desktop Services (RDS). TruGrid includes fully-integrated security (MFA, Dark Web Scanning, AD Integration) and cloud scalability. TruGrid can be implemented in minutes.

  • Revizto BIM Icon

    Revizto BIM

    Connecting Architecture, Engineering and Construction throughout the entire project lifecycle

    Revizto unifies BIM intelligence and makes it immediately accessible and actionable for the entire project team. With Revizto's advanced Issue Tracker predefined workflows project team members can identify and manage model-based issues in the 3D space and 2D sheets, including addressing clash groups. Revizto provides unified access to a project's data both for 2D and 3D workflows, so anyone can use it depending on project requirements.

  • 1

    IBM's Software TPM 2.0

    This project is an implementation of the TCG TPM 2.0 specification. It is based on the TPM specification Parts 3 and 4 source code donated by Microsoft, with additional files to complete the implementation. See the wiki for additional support - additions to the documentation. See the companion IBM TSS at https://sourceforge.net/projects/ibmtpm20tss/

  • 2

    Whonix

    Whonix

    Whonix is an Anonymous Operating System.

    THIS IS NOT WHONIX'S HOMEPAGE. Please go to: https://www.whonix.org/ (This is only Whonix's sourceforge must-have project page.) Whonix is an operating system focused on anonymity, privacy and security. It's based on the Tor anonymity network, Debian GNU/Linux and security by isolation. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP. Whonix consists of two parts: One solely runs Tor and acts as a gateway, which we call Whonix-Gateway...

  • 3

    PWSLIB3

    PWSLIB3

    Password Safe encrypted databases, Java library

    Java module to create, read and write Password Safe V3 encrypted databases. The package is a mature offspring from project JPasswords and can be used with Java 1.8. There is an API document available.

  • 4

    Pechkin

    Pechkin

    lightweight bitmessage client

    Pechkin.v0.3.2 Copyright 2017 Fenenko Aleksandr. Licensed Apache License, Version 2.0; This is lightweight bitmessage client writing in java. Supported platform: Android,Linux,Windows play google: https://play.google.com/store/apps/details?id=pro.fenenko.pechkin The author of this project is looking for a remote work of a programmer. If you have any suggestions, write to aleksandr@fenenko.pro

  • The 3D Catalog Platform Driving Qualified Leads for Industrial Manufacturers Icon

    Get your products spec'd in by delivering 3D CAD models of the products you sell on your website. Today's industrial buyers require on-demand product data, instant CAD & BIM downloads, and high-quality product images.

  • 5

    Fork of kplet software by Sharat Chikkerur Realized as Code::Blocks project. Version 0.1.0.4

  • 6

    ClamAVSuite

    ClamAV-Suite is a gui for ClamAV developed for Windows 10 (x64 only). ClamAV-Suite allows to scan your device in three different ways: -fast scan -full scan -custom scan For other information see documentation. If you represent CISCO and suspect trademark violations contact me at: dntpanic[at]users[dot]sourceforge[dot]net After 3 years since the project is on sourceforge I realized that names and logo could be copyrighted.

  • 7

    smartIDS

    Lightweight intrusion detection for IoT and embedded devices.

    The aim of the project is a lightweight intrusion detection library for embedded devices which supports MSP430 and ARM Cortex based devices. Features include DSP/SIMD support, IoT and embedded protocols, distributed operation, event and history management, tool supported configuration and visualization. There is a Java port that supports less features.

  • 8

    PHP Web Toolkit

    The PHP Web Toolkit enables the rapid development of multi-layered web applications and is designed to be easy to use, extensible, reliable, reusable, scalable and secure. It integrates with ADOdb, FCKeditor, kses, Libmcrypt, Libmhash and Smarty.

  • 9

    RetroShare

    RetroShare

    [WARNING] Project has moved to http://github.com/Retroshare/Retroshare

    [IMPORTANT] Retroshare is now distributed on Github. Please go to http://retroshare.net to find the latest releases and sources. RetroShare is a cross-platform, secured and decentralized communication system. It lets you to securely chat, share photos, videos, and more with family and friends, using OpenPGP to authenticate peers and OpenSSL to encrypt all communication.

  • Knowledge Powered Solutions, Knowledge Management Systems Icon

    Universal Knowledge from KPS provides comprehensive content capture, search, collaboration and insight functionality enabling internal employees and customer facing organisations to significantly increase productivity.

  • 10

    yagodu

    yagodu

    password safe / manager for linux and windows (and mac ?) via qt

    ... in the directory where the .pro file is and you should be done. When building with Windows I suggest MinGw. The encryption is taken from a c-sample from Bruce Schneiers site. If someone could check it, that would be nice. OS/2: http://www.os2world.com/past-news/80-software/20576-yagodu-v2-3

  • 11

    DoS As You Are

    Just a little project I've made last summer.Nothing too serious.If you want to help be my guest.It's written in .NET(C#) so you can de-compile it using IL-Spy.

  • 12

    White Knight

    Knock down your server into full disk encryption when a user attempts to physically attack your hardware via USB. This project seeks to provide a quick any easy low overhead solution that will shut your computer down to trigger your full disk encryption before an unsophisticated adversary has time to extract sensitive data. News: Alpha 0.04 Hotfix Update - Passwords now work! - Successfully tested against USB Rubber Ducky! This release I worked on building out a class that can be used...

  • 13

    Razorback

    Razorback

    Project Razorback(tm). A framework for detection.

  • 14

    NSDi - Network Services Discoverer

    NSDi (Network Services Discoverer) is a metarepository for big/small environments. This tool uses differents plugins to discover the services and software installed on servers. You can create many repositories accesibles via API for many external tools.

  • 15

    AESA

    All-purpose Encryption and Security Adaptation

    Starting as a personal study project, I have decided to share this security project. For now, it is a JAVA program that can be used to encrypt and decrypt simple file content (ie files), possibly later evolving into a utility with user interface and/or a library

  • 16
  • 17

    Malware Analysis Network in Taiwan <Man in Taiwan, MiT> Welcome to contact us (TonTon@TWMAN.ORG) if you are interested in collaborating with us. This project is open source and distributed under the GNU General Public License version 3. Please feel free to add to or modify this source and propose changes or new converters. Developer & Copyrighted by : TonTon Hsien-De Huang Prompter: Jazz Yao-Tsung Wang, Figaro Chen-Ho Yang | Logo Desinger:Temaki Guo Community on Google+:http://X.TWMAN.ORG...

  • 18

    Flicker: Minimal TCB Code Execution

    Flicker is a project to execute security-sensitive code in isolation from an operating system such as Windows or Linux. Flicker works on x86-class systems from AMD and Intel with support for dynamic root of trust.

  • 19

    XOR encrypt v2.0

    This software provides an easy graphical way to encrypt your text documents from source code , text files ,scripts even jpeg files .It is a enhanced version of my earlier project https://sourceforge.net/p/xorencrypt which used win32 GUI . This is a demonstration of working of XOR encryption which was used by Germans in World War II (http://en.wikipedia.org/wiki/Lorenz_cipher) . Besides from XOR'ing the message with password after every encryption the key changes pseudorandomly...

  • 20

    hNix OS

    hNix OS

    A vulnerable lab for IT Security professionals & students

    A vulnerable toolkit & lab for IT Security Professionals, Hackers and Students. This is a Linux based Operating System & has been developed for those concerned with IT Security. Contains various software, exploits and is vulnerable to attacks. This project is a fork of the project MyLab@Home developed by Huzaib Shafi (http://www.shafihuzaib.com)

  • 21

    Simple Cipher Decoder

    Change log 1.01: 1)Error fixed on clicking solve and arrow buttons in the vigenere decoder 2)Error fixed when number of columns exceeds text length in substiution cipher 3)Can now handle variable block length when changing columns 4)Multiple identicle conversion values onn the frequency analysis page now not allowed This project is near its final stages but there may still be improvements to be made. If you could write some form of review or send me an email with advice I would greatly...

  • 22

    File Attrib Change

    File Attrib Change

    With this program you can change the attributes of any file(read, write, hidden, temp, etc). You don't need to install it, just download and run. This is a demo version, so its not a fully functional. Soon I will upload the final project, so you can change the attributes and the time(created, accessed, modified) of a file or folder. For any questions or suggestions, email me at: bozhidar1991@gmail.com

  • 23

    innocence-java

    Replace text with POS equivalent text, in a reversible fashion.

    .... It also relies on the sender and receiver having a shared (identical) vocabulary file. The project contains code to test input sentences for inclusion of words in the current vocabulary, and can create entries for new words as needed. The vocabulary has a "MD-5 hash" value to make sure that the share vocabulary file is identical for both sender and receiver. The software also contains a "bad-words" list of words that should never be generated in the text to be sent.

  • 24

    EnigmaGPG Community

    Enigma GPG Community allows you to encrypt / sign text and attachments using plugins in browsers, to send encrypted information via any Internet application that can only be understood by the intended recipient ensuring the authenticity, privacy and confidentiality of messages between the sender and receiver . Note the utility that can achieve this project because it aims to meet the global need for privacy on the web. Also applies to any web application that allows text input by the user...

  • 25

    Implementation of block parity for hiding data in bi-level pbm images in java. Increasing the security of stenography by using a random symmetric key for embedding and extraction of data from image. The project also has a PBM viewer in java and ascii viewer which shows the pbm images in ascii format.This project uses binary coded pbm images. Research paper : http://arxiv.org/abs/1304.1683 Key mechanism is not functional and program have bugs which are to be fixed.

Pintos Project 3 Design Document Solution

Source: https://sourceforge.net/directory/security-utilities/security/?q=pintos%20project%203