Showing 9 open source projects for "x86_64-win32-seh"

View related business solutions
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    Build gen AI apps with an all-in-one modern database: MongoDB Atlas

    MongoDB Atlas provides built-in vector search and a flexible document model so developers can build, scale, and run gen AI apps without stitching together multiple databases. From LLM integration to semantic search, Atlas simplifies your AI architecture—and it’s free to get started.
    Start Free
  • Simple, Secure Domain Registration Icon
    Simple, Secure Domain Registration

    Get your domain at wholesale price. Cloudflare offers simple, secure registration with no markups, plus free DNS, CDN, and SSL integration.

    Register or renew your domain and pay only what we pay. No markups, hidden fees, or surprise add-ons. Choose from over 400 TLDs (.com, .ai, .dev). Every domain is integrated with Cloudflare's industry-leading DNS, CDN, and free SSL to make your site faster and more secure. Simple, secure, at-cost domain registration.
    Sign up for free
  • 1
    Simple Software-restriction Policy

    Simple Software-restriction Policy

    Control which folders programs can be run from.

    A software policy makes a powerful addition to Microsoft Windows' malware protection. In particular, it is more effective against ransomware than traditional approaches to security. If you know about the Linux 'execute permission' bit then you'll understand what this is for. The mode of operation is somewhat different in that execute permission is granted to folders and subfolders rather than individual files, but the intention is the same, to stop undesirable or unknown software...
    Downloads: 19 This Week
    Last Update:
    See Project
  • 2
    Enigma Encryptor

    Enigma Encryptor

    Encrypt and package files

    Encrypt and package files and folders simply and quickly. The generated file can be unpacked and decrypted only having the decryption key
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    HFV (Hidden Folder Virus) Cleaner Pro

    HFV (Hidden Folder Virus) Cleaner Pro

    A Small Utility programmed to destroy Win32:Atraps-PZ[Trojan]

    Many a times when we connect our PenDrive to a PC or Laptop, wedon't see our files and folders, instead see one or multiple shortcuts. Assuming these shortcuts as innocent, we launch them which in turn infects our PC or laptop with a virus which the geeks call Win32:Atraps-PZ[Trojan] Simply speaking, the shortcut creates a backdoor to your system so that it can access all your files,services and privileges within that system & all others connected to it without your permission...
    Downloads: 78 This Week
    Last Update:
    See Project
  • 4
    ArcThemALL!
    It supports files and folders multi-compression (UPX, ZIP, 7Z) and archives extraction (several formats). It includes an intelligent UPX compression mode, self-extracting archive creation, encryption/decryption, external compressors and much more.
    Downloads: 25 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 5

    Dynamic Proxy

    Fetches proxies from hidemyass and changes system proxy in real time.

    Programmer name : Daryl Varghese and Kishan Patel Dynamic Proxy/Madleets Proxy v1.0 is a dynamic proxy made for madleets.com. The proxy application fetches the best proxies from hidemyass.com and changes the system proxy configuration in realtime. Features: 1.It work on all windows systems(both32bit and 64bit) 2.It has no dependencies 3. Uses the wininet Api to change system proxy 4. It is less than 700kb 5. Proxy can be changed by either hotkey or userdefined time...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    T RunAs

    T RunAs

    An administrative tool

    T RunAs allows you to run a program with administrator rights. it is very useful for administrators who want to grant certain rights for users with no power.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 7

    Restrict Application

    Easy to use parental control

    NOTICE: THIS SOFTWARE IS NO LONGER DEVELOPED. It was initially developed for Win XP and slightly tested on Win 7. I have never tried it with Win 8 or later. I have not planned any future developments or bug fixes. Original description: Restrict Application is powerful parental control software that can easily block adult content or any other site, game or software. Restrict Application can be set to update it's configuration from remote server allowing to update configuration...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Project Vaccine

    Project Vaccine

    worlds first antimalware software which spreads like a malware.

    VACCINE v1.0 Worlds first antimalware software which removes a specific set of viruses from the entire cyberspace.Unlike all the other antimalware software's vaccine is an opensource program,uses virus mode of spreading to accomplish the aim,is free of cost and doesnt affect the computer performance. Features: 1. usb disk security 2. automated virus/malware removal from usb drives 3. disinfection of specific types...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    MD5 Virus search and cleaner
    a Small Portable program that scans and delete the virus using user specified MD5 Value.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • Previous
  • You're on page 1
  • Next