Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
Create free account
Try Google Cloud Risk-Free With $300 in Credit
No hidden charges. No surprise bills. Cancel anytime.
Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
Code to brute force the 32-bit key used to RC4 encrypt .pwl files.
PROJECT HAS MOVED TO GITHUB:
https://github.com/alex-georgiou/rc4-32.asm
Code to brute force the 32-bit key used to RC4 encrypt .pwl files. Assembles to a 992 byte .COM file using the Intel Architecture Assembler v1.0 Copyright (c) 1998 augusto at dcc.ufmg.br.
http://web.archive.org/web/19981205090800/http://www.dcc.ufmg.br/~augusto/project/iasm.zip
NOTE: THIS PROJECT IS DEPRECATED
NEW VERSION AVAILABLE AT: https://github.com/pmsosa/CasualKrypt
------------
CasualKrypt is a simple and intuitive encryption/decryption tool that enables quick and easy enc/dec of text files or on-the-go messages. This program is meant for casual en/dec. DO NOT, for the love of god, encrypt your company's Top Secret reports.
MS windows shell script to create simple certificate infrastructure. Handle self signed root certificate (CA), service certificates (httpsserver for example) and user (personal) certificates.
Cia project tries to develop an all-purpose security tool. It's composed by ctools, the security tool; cfs, the app and cfs-server, a file & key server.
Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Derived from TrueCrypt 6.3 release, I added some command line options to "TrueCrypt Format.exe" to allow TrueCrypt volumes to be created without using the graphical user interface
Software solution for creation and verification of digitral signatures. Can replace tokens and smart cards with mobile phones. Components included are client and server. Can creates, verifiy and store content and signatures. Offers secure sharing.
Set of perl scripts to analyse and check expiration of user certificates in Microsoft Windows Certification Authority. Output is in HTML with list of expiration state of latest user certificates. Expirated are marked. List can be sent by e-mail.
The aim of this small program is to parse your address book (Evolution address book or VCard file for the moment) and check if some of your contacts have uploaded a PGP public key on a key server.
Put idle assets to work with competitive interest rates, borrow without selling, and trade with precision. All in one platform.
Geographic restrictions, eligibility, and terms apply.
Power Hasher is a program that allow you to get the hash code of multiple files at once, and export the results to a file, making easy for this file to be imported and the files checked. Currently it supports MD5, SHA1, SHA256, SHA384 and SHA512.
Corporate Data Protection and Network Security is a IT project targeting policy-based and fully-automated data protection, encryption and transmission. We plan to create self-diagnostic risk-predict enterprise environment with artificial intelligence.
Free Version - Krytponite Free provides 2048 bit encryption on any type of file as text, pdf, mp3, etc. This implementation is platform independent and uses an apache-tomcat server, and runs all computers (Linux, PC, and Mac).
JavaLightServer is a multi-purpose server that can be used to share our desktop across the Internet with other authorized clients. It provides also a secure connection using SSL certificates.
FSFS is a secure distributed file system in user space built over FUSE and OpenSSL. It stores AND transfers data between clients and server in secure form, leaving most of the cryptography to the clients, thus relieving the server of the additional work.
Cryptology is a Windows shell application that enables users to easily protect their files. It incorporates military grade encryption (256 AES) and secure shredding into a simple user interface
OpenVPN Key Distribution System allows a web server and a OpenVPN server to exist at the edge of a network and gives a reliable system for passing out openVPN keys to the user base using ssl and php5.
Simplebackup is a cross-platform backup program. It reads a configuration file then builds a compress backup set, finally places the compressed files into another location (a directory, a remote http,ftp,sftp server or even one or more email accounts).
Waste.net is a .NET-driven application geared towards providing a secure online encrypted file-sharing service. This is a purely managed .NET 2.0 port of the original Waste client/server.
TC-Wrapper is a Windows service which opens/closes TrueCrypt containers automatically using an USB-Stick with a key file. Containers are even mounted if you are not logged into your system.
The J-WASTE project aims at the implementation of a platform independent client/server Java implementation of the WASTE protocol. This project started as a mandatory project course in networking at the Luleĺ University of Technology in Sweden.
SPipe (Secure Pipe) is a patch of mod_ssl package which allows the same corporate web server to be used as a secure access door to internal servers that do not use HTTPS protocol, while also retaining normal web server functionality for all HTTP requests
GNet Server - Network compression client/server software. Compresses data over slow networks to save on the cost of bandwidth. Server is developed for Unix and Windows platforms, The client will run on Windows based PCs.
The algorithm allows any kind of weights (costs, frequencies), including non-numerical ones. The {0, 1, ..., n-1} alphabet is used to encode message. Built tree is n-ary one.The algorithm is based on a set of template classes : Cell(SYMBOL, WEIGHT), Node(