Search
Code Directory
 ASP
 ASP.NET
 C/C++
 CFML
 CGI/PERL
 Delphi
 Development
 Flash
 HTML
 Java
 JavaScript
 Pascal
 PHP
 Python
 SQL
 Tools
 Visual Basic & VB.NET
 XML
New Code
GetOrgChart 2.5.3
AnyGantt JS Gantt Charts 8.6.0
AnyChart JS Charts and Dashboards 8.6.0
Multi Vendor Ecommerce Script & Apps 4.0
Magento 2 Inventory Management Extension 1.0
Yipit Clone Script - Daily Deals Software 1.0.2
Devart Excel Add-in for Oracle 1.7
Devart Excel Add-in for Freshdesk 1.7
Devart Excel Add-in for G Suite 1.7
C# QR Code Generator 4.0.2.2
Salesforce WordPress Customer Portal 3.2.0
Single Leg MLM 1.2.1
OzGIS 14.6
Quick Maps For Dynamics CRM 3.1
Job Board Software 4.2
Top Code
VisualNEO Web 2018.12.15
Paste phpSoftPro 1.4.1
Deals and Discounts Website Script 1.0.2
ADO.NET Provider for ExactTarget 1.0
Solid File System OS edition 5.1
Classified Ad Lister 1.0
Aglowsoft SQL Query Tools 8.2
Invoice Manager by PHPJabbers 3.0
ICPennyBid Penny Auction Script 4.0
PHP Review Script 1.0
ATN Resume Finder 2.0
ATN Site Builder 3.0
Availability Booking Calendar PHP 1.0
PHP GZ Blog Script 1.1
ATN Jobs Software 4.0
Top Search
Code To Add Url
Photo Add Comment Php
Dirty Word
Guestbooks Aspnetindex
Oracle Forms Array
Php Banner Traffic Tracking
Gallery Comment
German Guestbook
Flat File Php Guestbook
Gallery Comments
Captcha Guestbook
Article Directory Script For Wordpress
Html Guestbook Codes
Photo Gallery Comment Php
How To Remove Powered By Webnode Footer
Related Search
Mini Projects In Cryptography And Network Security
Industry Oriented Mini Projects In Java And Net
Mini Projects In Java And Source Code
Mini Projects In C And C
Free Codes For Mini Projects In C And C
Cryptography And Network Security
Source Code For Mini Projects In C And C
Source Code For Mini Projects In Vb And Oracle
Mini Projects In Computer Sciencecomputer Network
Mini Projects In Cryptography
Abstracts For Mini Projects In C And C
Mini Projects In C And C With Source Code
Free Download Of Mini Projects In C And C
Simple And Mini Projects In C And C
Mini Projects In Networks Using Network Simulator
 Mini Projects In Cryptography And Network Security 

Code 1-20 of 60   Pages: Go to  1  2  3  Next >>  page  






This module is in development and has security issues. Use at your own risk.
Currently, we are in touch with a few security companies to see what can be done to make this module secure and stable.
Updates and new release coming up.

The eid module makes it possible to add Belgium eID Authentication to your Drupal site. It works with a reverse proxy authentication.
Installation

* Download and extract the...



The Network Security Response Framework (NSRF) allows for testing different computer security response engines and methodologies. It supports simulated and real: Intrusion Detection Systems (sensors), Attacks, and Responses.



Secure Bytes provides Secure Cisco Auditor, which is a state of the art Next Generation network security auditing software for Cisco firewalls, routers and switches along with different Router audit tools and Network security Software.



Secure Bytes provides Secure Cisco Auditor, which is a state of the art Next Generation network security auditing software for Cisco firewalls, routers and switches along with different Router audit tools and Network security Software.



An SVG framework in C# and an SVG-GDI+ bridge is an article through which programmers can gain knowledge about SvgNet, which is a C# library that facilitates the process of creating SVG images. Here the author explains about various classes that...



How To Use XML in Connected and Disconnected ADO.NET Applications is an user friendly tutorial in which author describes the method of using XML for connecting and disconnecting ADO.NET application. The author gives details about method of...



Calculates slope and intercept for linear regression of data with errors in X and Y. The errors can be specified as varying point to point, as can the correlation of the errors in X and Y.

The uncertainty in the slope and intercept are...



Simulation of the trajectory of a particle in electric and magnetic field (electromagnetic field). The trajectory is calculated by computationally solving differential equations. The direction and magnitude of magnetic and electric field can be...



Discontinued

Different Localization in front- and backend adds the possibility to use different localization in frontend and backend. This plugin was quickly written by me due to a request in the official german WordPress support...



Allow PHP in posts and pages adds the functionality to include PHP in wordpress posts and pages by adding a simple shortcode [php].code.[/php]

This plugin strips away the automatically generated wordpress <p /> and tags but still...



Allow javascript in posts and pages adds the functionality to include javascript in wordpress posts and pages by adding a simple shortcode [js].code.[/js]

This plugin strips away the automatically generated wordpress <p> and...



This is a Random Sequence generator used in Cryptography, Spread Spectrum, Information Security



This project is a collection of all the projects that are open source or are in progress and will be open source.



Security is one of the most essential criteria of the web developers while programming any application. Important informations should be protected. The author has discussed in detail about the security issues and functional specifications,...



Dicole is to track the projects and network based learnings etc., using it's inbuilt perl functions. Web based admin section allows multiple users to utilize the modules as per their access level. Sharing module enables members to contact them and...



eScan 2003 ISS, working on MicroWorld Winsock Layer technology is a complete security suite providing essential protection against viruses, objectionable content, hackers and privacy threats.It helps in parental and privacy control.The...



The accompanying code is the simulation of a simplified version of a synfire chain in a cortical network, inspired by the ideas of Abeles (1982, 1991), Bienenstock (1995), and Diesmann et al. (1999). In a synfire chain groups, or pools, of neurons...



The Acquia Network enhances the Drupal experience by providing the support and network services to operate a trouble-free Drupal website. Subscribers to the Acquia Network gain access to remote network services, documentation and the Acquia...



Q-Views is currently in Alpha and has a couple of security flaws that need to be sorted out before being released as beta. Note that Alpha releases should never be used on production sites. Please also note this module has multiple critical...



NoOra is an attempt to apply a pattern to develop Oracle database projects in order to promote portability and productivity.