With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Build Securely on Azure with Proven Frameworks
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Secrets is a complete, standalone, personal encryption solution that works much like PGP (Pretty Good Privacy). With Secrets you can encrypt information before emailing it to a friend or coworker, or before storing it on a removable disk. Secrets is buil
BIM is a Java based AOL Instant Messenger (AIM) Client featuring a full feature Swing GUI. BIM also comes with encryption support. It has a small code base (617KB w/encryption libs) and can be easily dropped and run on wide array of operating systems.
Create custom applications tailored to your specific needs.
GW Apps empowers your team to create tailored business applications in days, not months. Streamline operations, automate workflows, and manage data more effectively—all without writing a single line of code.
The Tiny EncryptionAlgorithm (TEA) was developed by David Wheeler and Roger Needham at the Computer Laboratory of Cambridge University. The variant used was developed by David Wagner. TEACrypt 80x86 is the porting of this algorithm to the 80x86 platform
Tired of spending hours of sleep tuning you Robocode Bot?
Your bot is full of constants that if wrong tuned would let to awfull performances?
BotOptimizer will help you tune the bot, allowing you to define also your optimization algorithm.
Flatch@ is yet another client-server chat application for the WEB. PHP on the server side, Java applet on the client, very easy installation, firewall-friendly (HTTP communication), multiple rooms, private channels, support for end-to-end encryption.
sha is a file hashing utility that uses the NIST's SHA-1, SHA-256, SHA-384, & SHA-512 hash algorithms. It can be used for file integrity checking, remote file comparisons, etc. The portable algorithm implementations can be useful in other projects too.
MATRIX is a world-class, award-winning learning management system (LMS) for businesses.
For small, medium, and large sized corporations, as well as associations and public organizations
The platform is known for delivering a great user experience, while incorporating all the essential tools companies need to support efficient training and learning.
SimAlgPro - it is a tool to simulate the main algorithms for processor planning. to contribute to the learning process. It allows visualize of interactive form the algorithm application and results.
This project provides a library of standard data types (lists, trees, graphs, semaphores, locks, points, vectors, matrices, shapes, etc.) and standard algorithms (sorting, depth first search, shortest path problem etc.)
ObscureEncrypt is a high level security encrypter. It encrypts at three levels, 448 bit Blowfish encryption, Obscurity, high level encryption. Making it almost impossible to decrypt
Simple Encoder/Decoder, written in the .net framework.
It is basicly an encryption program which supports serveral encryption methods.
It can encode or decode texts in the forms of files or just plain text written directly in the program.
A simple working implementation of 64-bit DES encryption/decryption alogrithm in C++. Could act as guide to undestanding the algorithm. Its buggy so help me out :-)
A mobile agent framework. Instead of relying on protocols across the wire, send an agent to the server to execute.
An example is encryption: send an agent to retrieve data, but let it do the encryption. Client side encryption on the server!
Simulated annealing package written in Java using simplex downhill algorithm from Numerical Recipies in C++/FORTRAN/C
It is intended for use "behind the scenes" in applications, and it is optimised for ease of integration.
Completely standalone,
jui is a tool for creating Java GUI layout components. It has a powerful but simple layout algorithm and support for the Swing look and feel guidelines.
The Athlete is a virtual robot living in the ODE (Open Dynamics Engine)world. An evolution algorithm is implemented based on the DR-EA-M to optimize its performances. This involves a Genetic algorithm, network of neurons and morphology. All is in java.
Java class file encryption. Class Encrypt is a program that can encrypt a developer's class files and package them into an executable jar file for deployment. The program uses modules for implementing different encryptions.
I needed a library of functions that enabled me to perform hash
functions and symmetric cryptography. I chose MD5 initially but
eventually chose SHA as the hashing algorithm due to concerns regarding
the \'collision resistance\' of MD5 due to weakne
A fast, simple method of establishing musical genre of arbitrary compressed audio files calculated by comparisons with training sets. Program currently consists of a java console program. GUI front end, algorithm upgrades to come.