With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
No-Nonsense Code-to-Cloud Security for Devs | Aikido
Connect your GitHub, GitLab, Bitbucket, or Azure DevOps account to start scanning your repos for free.
Aikido provides a unified security platform for developers, combining 12 powerful scans like SAST, DAST, and CSPM. AI-driven AutoFix and AutoTriage streamline vulnerability management, while runtime protection blocks attacks.
Apache Cayenne, Wicket, CXF, GWT, EJB examples as a framework
Yet another (different) framework.
Examples around Apache Cayenne. Using different technologies like
Apache CXF
Google Web Toolkit
EJB
Apache Wicket
Eclipse RCP
Java
ANSI C
Perl
Python
Bash
WE MOVED TO GITHUB.COM !! All sources are now in git on github.com - search for yafra project. Thanks sf.net for the very good service in the past - but now it was time to move on!
Anemasys is a network managemet system for small networks of Linux clients. It provides functions like state control and class based remote administration facilities. It consits of a collection of python scripts and an admin gui frontend.
metalicblue is a instant messenger server and client will very versatile and feturefull also free for linux/unix
if you would like to join the project please email admin@kc8yho.org
need developers and programmers always needing help and very nice team m
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.