Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Start Free
Build Securely on AWS with Proven Frameworks
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Crypt encryption and decryption is based on ASCII Table Shift.
Crypt is the developed based on the ASCII Table shift and it can customized based on the user requirements, right from the shifting order and the level of encryption or decryption. It can be integrated to any of the programminglanguage with the custom build of the source code. It can secure from text file to binary code.
ISC lets you encrypt & decrypt text and files of any type up to 4GB
ISAAC is a cryptographically secure pseudo-random number generator (CSPRNG) and stream cipher. It was developed by Bob Jenkins from 1993-1996 and placed in the Public Domain. ISAAC is fast - especially when optimised - and portable to most architectures in nearly all programming and scripting languages.
After more than 20 years of existence ISAAC has not been broken, and the little program you have here allows you to use it to encrypt and decrypt text of arbitrary length, files of any...
AESEncryptor is a fast and simple utility to protect your files with the Advanced Encryptation Standard algorithm. It is safer than zip or rar files because a simple force-attack can reveal their password. A force-attack to an AES encriptation could delay millions of years. There are available the source code of the GUI, a CaptionProgressBar and the RijndaelCryptorProvider, the core of the application which can start a encriptation process in a simple code line.
New Version released...
A formally verified implementation of cryptographic algorithms using the SPARK programminglanguage. For the complete library proofs of the absence of run-time errors are available. Some of its subprograms include proofs of partial correctness.
Full-stack observability with actually useful AI | Grafana Cloud
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
ShredBitz is a free and simple file shredder tool that can wipe selected files from any hard disk drive. ShredBitz is written in the java programminglanguage and uses a custom written algorithm for shredding.
ShredBitz is a very powerful tool.
Erinaceus is an esoteric two dimensional programminglanguage which uses bitmaps as sourcecode. It is turing complete and able to modify itself. It has been created with the goal to create a language that can be hidden in pictures easily.
CryptoTW provides a win32 DLL that acts as an interface between the GPG.EXE from gnupg.org and a win32 program. Programming automated systems against the GPG.EXE is challenging. By solving the problem once, as a DLL, many developers can benefit.
AceJudge is a system for managing programming contests. AceJudge's basic features include automatic judging of submitted programs, answering to clarification questions about problem descriptions, reevaluation of programs, real time ranking etc.