Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Download Now
Gemini 3 and 200+ AI Models on One Platform
Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.
Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
A light weight Desktop Search Application built in .net C# and Vb.net implemented using file search recursive algorithm and threads. provides explorer like view of files. It can be implemented in mono(platform independent).currently only runs on Microsoft Platform.
Secret Sharp is a wizard based GUI for the Shamir Secret Sharing Algorithm provided by the crypto++ API. Secret Sharp replicates the functionality that 'ssss' provides on unix.
VTK.NET Example is a collection of example for the Visualization Toolkit (VTK - http://www.kitware.com). It demonstrate, the basic visualisation algorithm in .NET 2.0 platform and C# programming language.
The Drools.NET is a .NET port for Drools, which is a java Rules Engine based on Charles Forgy's Rete algorithm. Drools.NET enables .NET developers/Users to exploit the powerful Rule Engine like Drools through a completely managed .NET code base.
Secure File Transfer for Windows with Cerberus by Redwood
Protect and share files over FTP/S, SFTP, HTTPS and SCP with the #1 rated Windows file transfer server.
Cerberus supports unlimited users and connections on a single IP, with built-in encryption, 2FA, and a browser-based web client — all deployable in under 15 minutes with a 25-day free trial.
An open source implementation of Paul Graham's algorithm to identify spam mail messages. It consists of a library (GrahamAlgorithm) and a simple application (Spam Buster) to test the filter.
RC4.NET is a library that adds support for encrypting/decrypting using the symmetric RC4 algorithm in the .NET environment. The library is written in C# language, and performs equally well on both the Microsoft CLR and Mono platform.
NSvm is a .Net Support Vector Machine library written in .Net. NSvm features the SMO algorithm, a few kernels (including ad hoc algorithms for linear kernels). The objectives of NSvm are simplicity, flexibility and extensibility.
The Genetic Programming Engine project provides a framework for conducting experiments in Genetic Programming. The framework was designed with extensability in mind and allows for easy creation of new problems and operations.
JAligner is an open source Java implementation of the dynamic programming algorithm Smith-Waterman with Gotoh's improvement for biological local pairwise sequence alignment with the affine gap penalty model.
ALIMP (A LIttle More Privacy) is a .NET C# software enabling users to easily cypher and de-cypher files on their computer using common algorithm (DES, 3DES, AES, ...) that are shipped with the .NET Frawemork.
TextDiff.NET is the .NET component to list differences between two integer arrays using a "longest common subsequence" algorithm. Typically, this component is used to diff 2 text files once their individuals lines have been hashed.
It moves by itself inside networks like virus infection & plagues, it is being written to solve computer virus problem drastically and responsibly. It is legal, free and open for public domain to improve W3 ICT Security.
Common utility methods, classes and algorithm library for general use. Although this library focuses on common utility algorithms, main goal of this library is ease of use by trading some flexibility.
BloodHound is a Windows program compiled from C# source files that will generate Cyclic Redundancy Check numbers for a given file, directory/folder, or other locations. The program uses the CRC-32 algorithm using the same seed as used in Ethernet layer.
Takthons provides container and manipulation services for evolved machine language routines. This allows the calling application to concentrate on the UI, the fitness evaluation and the genetic operations rather than the machine language details.