With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Powering the best of the internet | Fastly
Fastly's edge cloud platform delivers faster, safer, and more scalable sites and apps to customers.
Ensure your websites, applications and services can effortlessly handle the demands of your users with Fastly. Fastly’s portfolio is designed to be highly performant, personalized and secure while seamlessly scaling to support your growth.
The database access library for C++ programmers that provides the illusion of embedding SQL in regular C++ code, staying entirely within the C++ standard.
A Java application for transferring computer files in 5 letter groups
Codegroup is a Java application that will allow one to convert binary (or text) computer files in to 5 letter codegroups for transmission over email, landline telephones, radioteletype or Morse Code.
Codegroup has internal error correction & limited cryptography capabilities.
Codegroup :
ZZZZZ YBPIL AIAIG FMOPP CPAAA DGNGP GPGPA ADNJN ELJKO ELIMO
GEOHF KIFGP IFBCB PKCPI YJMHE PHBHP PPOBH NCOHD AKLLL AGHFP
DEGEF LKELC EAIJI ABAGP AHPPO IHHPH OHPDF YNFPB ALEPO KMPKP
Once this program...
Encrypt a text through a list of encryption methods
I came to the conclusion that this program is not worth the time for further development.
Use different Encryption methods with parameters to en- or decrypted a text through the list
With downloadable source-code since 1.3
You need to have Java installed
http://www.oracle.com/technetwork/java/javase/downloads/index.html
Project Sypher is a Java program that is intended to take a document and cipher the text, output the result in a new document and delete the original file.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
XMLStore is a new project that cares about XML-based Databases Access with users Authentication and Authorization and more such as dead-lock accesses.
It will be soon introduced to other kind of databases such as SQL,...
The main philosophy of the project is "the best protection a bad password can give". People will choose bad password as long as they have this option, so Neocryptex builds a strong crypographical defence between the password and encrypted data.
The goal of this project is to design and write comercial quality software and aplications with fully respect to free software (like in "free speach"). The software designed by us will target various fields: from scientific applications to multimedia an
The goal of this project is to develop a network protocol (Peer Instant Messenger Protocol, PIMP) that creates a distributed, peer-to-peer network for the transmission of instant messages, along with a graphical client that will allow users to access the
Now available in even more cloud regions across AWS, Azure, and Google Cloud.
MongoDB 8.0 brings enhanced performance and flexibility to Atlas—with expanded availability across 125+ regions globally. Build modern apps anywhere your users are, with the power of a modern database behind you.
It will be a project to provide a secure communication between a web server and a client running in mobile environments. Some different Cryptography algorithms will be implemented, and watermarks techniques.
mBuddy is a project with the initial goal of allowing users of mobile devices (Java, J2ME) the option to find others based on interests, diet & other factors. Objectives are to allow intelligent, conditional, secure exchange of contact info, A/V & more.