[go: up one dir, main page]

Showing 4 open source projects for "windows 9 iso"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • ThreatLocker Cybersecurity Software Icon
    ThreatLocker Cybersecurity Software

    Giving you complete control to help you manage your applications and better protect your endpoints.

    The Zero Trust security solution that offers a unified approach to protecting users, devices, and networks against the exploitation of zero day vulnerabilities.
    Learn More
  • 1

    Ubuntu Live Epic Miner

    Ubuntu Live Image Template for the Epic CPU Miner

    This template ISO image comes with pre-installed epic-miner (2.3.1-1) and librandomx (1.0.0-3) packages and can be used with Cubic https://launchpad.net/cubic on Ubuntu to create a custom bootable Ubuntu Live image (DVD or USB) for your personal EPIC mining without the need for a permanent installation on a dedicated mining computer: 1. Download template below and open ISO file in Cubic 2. Change mining pool, username and CPU configuration in /etc/epic-miner.toml in the chroot terminal...
    Downloads: 48 This Week
    Last Update:
    See Project
  • 2
    Ethereum Mining NVIDIA Graph Card Ubuntu

    Ethereum Mining NVIDIA Graph Card Ubuntu

    USB flash drive ISO image for Ethereum, Zcash and Monero mining

    USB flash drive ISO image for Ethereum mining with NVIDIA graphics cards and Ubuntu GNU/Linux (64-bit Intel/AMD (x86_64)). Other cryptocurrencies, such as Monero or Zcash, can also be mined. With this ISO image, you can immediately mine Ethereum (ETH). Do not spend long time searching and researching. If you do not trust me and do not want to use the image, you will find all configuration files and scripts in the files folder. You only have to install an Ubuntu Linux with all the drivers and...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 3
    BitcoinSuite

    BitcoinSuite

    Bitcoin GUI in Java

    BitcoinSuite is a Java based graphical user interface for Bitcoin, a peer-to-peer decentralized cryptocurrency. It is a direct fork of open source project NamecoinJ at http://sourceforge.net/p/namecoinj/. Donations are welcome: BTC: 1PqYXpLLSeAHz3FiZmPcfr451jnzsGgXbc, NMC: N2TFbwpTNhNLeXaBD8FSBbicb6guQNXUiA
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    NamecoinJ

    NamecoinJ

    Namecoin GUI in Java

    NamecoinJ is a Java based graphical user interface for Namecoin, a peer-to-peer Domain Name System based on Bitcoin technology (a decentralized cryptocurrency). Donations are welcome: BTC: 19o81NGAHpBmVXkfUcxSttwnBsBnLK9hS3, NMC: Mx3hanF6qXywPAyrAU4S14CwXYcMnecaai
    Downloads: 0 This Week
    Last Update:
    See Project
  • Attack Surface Management | Criminal IP ASM Icon
    Attack Surface Management | Criminal IP ASM

    For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces

    Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
    Learn More
  • Previous
  • You're on page 1
  • Next