-
With an increasing number of enterprises demanding reliable and cost-effective VoIP solutions and multiple companies promising to address this demand, getting a foothold in the VoIP market has been difficult for some companies. In order to grow, VoIP service providers need to consider their stock, staff, infrastructure, warehousing, customer service, and processes, among many others.
Sponsored Listing
-
OSI-Approved Open Source (1,911)
- GNU General Public License version 2.0 (1,121)
- GNU General Public License version 3.0 (211)
- BSD License (205)
- GNU Library or Lesser General Public License version 2.0 (177)
- MIT License (83)
- Apache License V2.0 (81)
- Academic Free License (45)
- GNU Library or Lesser General Public License version 3.0 (25)
- Artistic License (20)
- Affero GNU Public License (17)
- Open Software License 3.0 (17)
- Apache Software License (12)
- Common Development and Distribution License (11)
- Mozilla Public License 1.1 (11)
- Common Public License 1.0 (10)
- Public Domain (92)
- Creative Commons Attribution License (57)
- Other License (55)
- Linux (1,738)
- Windows (1,732)
-
Grouping and Descriptive Categories (1,406)
- All POSIX (538)
- OS Independent (423)
- All 32-bit MS Windows (411)
- 32-bit MS Windows (238)
- OS Portable (201)
- 64-bit MS Windows (137)
- All BSD Platforms (111)
- 32-bit MS Windows (76)
- Project is OS Distribution-Specific (8)
- Project is an Operating System Distribution (7)
- Project is an Operating System Kernel (3)
- Classic 8-bit Operating Systems (1)
- Mac (1,156)
- Modern (789)
- BSD (551)
- Android (543)
Cryptography Software
-
Hot topics in Cryptography Softwarewinscp wifi password cracker wifi password hack veracrypt password safe ssh jar facebook password hack ssh jar iphone java ssh gmail password crack
Showing page 1 of 88.
-
WinSCP :: Free FTP and SFTP client for Windows
37,421 weekly downloads -
Password Safe Popular easy-to-use and secure password manager
9,217 weekly downloads -
VeraCrypt Open source disk encryption with strong security for the Paranoid
6,740 weekly downloads -
In recent years the use of texting for business purposes has grown significantly. Factors such as speed, convenience, the burgeoning use of mobile devices, and the desire of companies to leverage new technology to engage customers have all led to the increasing acceptance of business SMS.
Sponsored Listing -
Advanced Onion Router Advanced Onion Router is a portable client for the OR network and is intended to be an improved alternative for Tor+Vidalia+Privoxy bundle for Windows users. Some of the improvements include UNICODE paths, support for HTTP and HTTPS proxy protocols on the same Socks4/Socks5 port with HTTP header filtering that generates fake identity-dependent headers every time the identity is changed (proxy chains are also supported), support for NTLM proxies, a User Interface that makes Tor's options and actions more accessible, local banlist for forbidden addresses, private identity isolation, a point-and-click process interceptor that can redirect connections from programs that don't support proxies, also giving them fake information about the local system and support for .onion addresses. Also, it can estimate AS paths for all circuits and prevent AS path intersections, it can restrict circuits to be built using only nodes from different countries, can change circuit lengths and more.
3,479 weekly downloads -
BeeCrypt Cryptography Library BeeCrypt is an ongoing project to provide a strong and fast cryptography toolkit. Includes entropy sources, random generators, block ciphers, hash functions, message authentication codes, multiprecision integer routines, and public key primitives.
6,400 weekly downloads -
xca X Certificate and Key management is an interface for managing asymetric keys like RSA or DSA. It is intended as a small CA for creation and signing certificates. It uses the OpenSSL library for the cryptographic operations.
2,235 weekly downloads -
AirSnort AirSnort is a wireless LAN (WLAN) tool which cracks encryption keys on 802.11b WEP networks. AirSnort operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered.
1,931 weekly downloads -
Portecle Portecle is a user friendly GUI application for creating, managing and examining key stores, keys, certificates, certificate requests, certificate revocation lists and more.
2,040 weekly downloads -
Gone are the days when contact centers were seen simply as call-taking centers, which relied on big and costly on-premise solutions whose sole purpose was to handle customer calls. Today, these contact centers have transformed and grown to become the ultimate customer experience hub, delivering support across multiple channels such as the web, social, phone, email, mobile and live chat. Read more about Avaya’s new Cloud Contact Center Solution.
Sponsored Listing -
EncFSMP Mount EncFS folders - multiplatform style.
1,334 weekly downloads -
AxCrypt - File Encryption for Windows AxCrypt - Personal Privacy and Security with AES-256 File Encryption and Compression for Windows. Double-click to automatically decrypt and open documents.
1,439 weekly downloads -
JSignPdf JSignPdf is an open source Java application which adds digital signatures to PDF documents. It also contains Add-On for OpenOffice.org.
1,160 weekly downloads -
jasypt: java simplified encryption Jasypt (Java Simplified Encryption) is a java library which allows the developer to add basic encryption capabilities to his/her projects with minimum effort, and without the need of having deep knowledge on how cryptography works.
1,625 weekly downloads -
OpenSC OpenSC - tools and libraries for smart cards
3,108 weekly downloads -
Voip-Info.org is the premier VoIP and Asterisk wiki on the web. Compare VoIP resources, collaborate with IP telephony developers, and use Voip-Info.org as a resource for all things Asterisk documentation, business VoIP, PBX, and more.
Sponsored Listing -
KeyStore Explorer This project has moved to GitHub: https://github.com/kaikramer/keystore-explorer
1,058 weekly downloads -
iDecryptIt iOS firmware tools
2,324 weekly downloads -
OpenStego https://github.com/syvaidya/openstego
1,035 weekly downloads -
Portable PGP Portable PGP is a fully featured lightweight java based PGP tool. It allows to encrypt,decrypt,sign and verify text and files with a nice and absolutely straight graphical interface.
3,020 weekly downloads -
pdfcrack pdfcrack is a command line, password recovery tool for PDF-files.
663 weekly downloads -
Steganos LockNote Store your most valuable notes in a LockNote. Hide your everyday notes in a safe place. Application and document in one: the mechanism to encrypt and decrypt a note is part of it. Secure, simple, independent. No installation required.
822 weekly downloads -
Crypto++ free C++ library for cryptography: includes ciphers, message authentication codes, one-way hash functions, public-key cryptosystems, and key agreement schemes
801 weekly downloads -
rarcrack This program uses a brute force algorithm to guess your encrypted compressed file\'s password. If you forget your encrypted file password, this program is the solution. This program can crack zip,7z and rar file passwords.
1,148 weekly downloads -
md5deep and hashdeep Recursively compute and match cryptographic hashes
507 weekly downloads -
EJBCA, JEE PKI Certificate Authority EJBCA is an enterprise class PKI Certificate Authority built on JEE technology. It is a robust, high performance, platform independent, flexible, and component based CA to be used standalone or integrated in other JEE applications.
513 weekly downloads -
KeePass Pronounceable Password Generator A pronounceable password generator plugin for KeePass. DISCLAIMER: Compared to traditional randomly generated passwords of the same length, pronounceable passwords are inherently weaker against brute force attacks. Using pronounceable passwords sacrifice some resistance against brute force attacks to reduce the risk of inadvertent password exposure. Whether this trade-off is worth it or not depends entirely on your use case. When using this application I recommend generating considerably longer passwords to make any brute force attack as difficult as possible. This application uses FIPS-181 for generating passwords and it is particularly vulnerable to brute force attacks that are targeted specifically towards the algorithm. I added modifications to the implementation (such as allowing the insertion of random numbers or symbols between syllables) with the intention of protecting against a targeted attack, but I cannot make any supported claims as to its effectiveness.
519 weekly downloads -
GnuPG for OSX GnuPG 2.x Distribution for Mac OS X
2,564 weekly downloads