Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
Create free account
8 Monitoring Tools in One APM. Install in 5 Minutes.
Errors, performance, logs, uptime, hosts, anomalies, dashboards, and check-ins. One interface.
AppSignal works out of the box for Ruby, Elixir, Node.js, Python, and more. 30-day free trial, no credit card required.
Hash is fast and simple java utility program for calculating and verifying checksums for files and text. Hash can generate MD5, SHA-1, SHA-256, SHA-384 and SHA-512 checksum values.
Cygnus Editor is a basic text-editing program created entirly in Java. And it's most commonly used to view or edit text files (.txt). A text file is a file type typically identified by the .txt file name extension. In Cygnus Editor you can encrypt your text document, so nobody can see the content of your document. Also you can decrypt your document and edit it.
Cygnus Editor uses AES-256 encryption.
Anoncrypt-Text Encryption and Decryption Website in Java(Struts2)
Anoncrypt by HTCoders is a web based Text Encryption and Decryption Project using Java Technology following Struts2 Framwork .
It Consist of two modules
> Password based Encryption (Symmetric Encryption)
> Self-Destructible Message Service (Once the message is read , it is destroyed and cant be decrypted again .)
A Java application for transferring computer files in 5 letter groups
...This project's initial sourcecode is related to :
http://www.fourmilab.ch/codegroup/
http://winmorse.com/
https://bitbucket.org/bgneal/cpp-enigma
http://www.whence.com/minimodem/
For the User Interface
http://www.oracle.com/technetwork/java/javafx/tools/
BeeCrypt is an ongoing project to provide a strong and fast cryptography toolkit. Includes entropy sources, random generators, block ciphers, hash functions, message authentication codes, multiprecision integer routines, and public key primitives.