Protect your business with AI policies and data loss prevention in the browser
Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
Download Chrome
Gen AI apps are built with MongoDB Atlas
The database for AI-powered applications.
MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
Tool "Contego" for encryption to plain text (UTF-8) and verification, testing and generation of MD5 and SHA-1 sums for files. Version 2.0 multilnguaje and fully operational. Encriptacion para texto plano (UTF-8) y utilidades para sumas MD5 y SHA-1.
Kryptographie is a student project to implement historic encryption methods. It has a linux style command line interface. This project will also include the notes for my talk I'll hold on cryptography in school. (in German).
A very simple file encryption tool. Release 1 is a text editor that saves encrypted files. Release 1.1 will include the ability to convert any file, even binary, to a GEF (Gulosh Encrypted File). Release 2.0 brings the strong encryption into play.
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
This is the extended euclidean algorithm implemented in haskell.
It will put every single step of the algorithm in a file and show the actual result and everything in between.
If you need to protect your confidential files in office or shared desktops, here is the robust command line and GUI utility to do password based encryption using AES. It can encrypt and decrypt a folder structure containing any number of files.
Backup P2P is a peer to peer application doing automated and secured backups inside a community (Jabber, XMPP). Each user shares some available space on his disk with others, to be able in return to remotely backup some of his own data.
This library provides two operations: one to wrap key data, and another to unwrap the key data. This code also includes a fairly comprehensive unit test library which ensures the implementation is verified against the vectors provided in RFC 3394.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
This tool encrypts text using polyalphabetic codetables, like the encryption systems in the middle ages. It can be used for simple text encryption with a small password or as a One-Time-Pad with a random codetable for 100% secure text encryption.
...Uses server to store user information (user name, password, email address, friends list, log in state, IP address) in encrypted form. Uses custom designed symmetric encryptionalgorithm.
sanesigner is a high level digital signature api component. it support generating and verifying digital signatures as well as encryption and decryption using public keys, and lots of other features in between.
Recolition is a simple file encryption program which uses AES as it's algorithm. It will encrypt exisiting files to the .encrypt file extension and then decrypt them back to thier original state.
Vijner 974 E-Sys (2048 bits and unlimited encryption). Enables easy (un-)encryption from text input or .txt file, and to (un-)encrypt raw files, with Vigenère Algorithm + unlimited encryption keys. Simple and powerful. Adapt to fit your needs.
otp.el is a one-time-password implementation in emacs lisp, suitable for generating one time passwords with the MD5 algorithm. It's designed to be plugged in to tramp.
JSRSA is a Javascript/PHP implementation of RSA algorithm which help you to simulate SSL-Like secure data transmission over the net as easy as possible !
A very powerful and secure encryption supporting multilevel algorithm hierarchy encryption(bit level),supports infinite length keys and equation creation utility(secondary key) for the utmost security.Support for multiple algorithms.All OS support(ja
SMScryptor encrypts and decrypts messages sent from any mobile phones using :
- AES 256 encryption
- J2ME MIDP2.0 CLDC1.1
- ECMAScript
- Apache / PHP / mysql
Roots III Encryption is an encryption suite in Java and C++ backed by the strong normality of irrational roots. It can easily offer more than 2048 bit security, and can be seen as a practical one-time key implementation.
talkLock is voice encryption software for your cell phone. talkLock includes a server component so that you own all points of encryption and decryption of your communications.
SJEA version 1.0 - Simple JavaEncryptionAlgorithm. SJEA is a simple command-line binary encryptionalgorithm (symmetric block cipher) written in JAVA. It uses a password and a byte-vector array to scramble the input file.
This package is a modest implementation of a non-alphanumeric encryptionalgorithm in java. But I'm kinda looking forward to creating a whole gui app implementing most well-known encryption tools, "the paranoid secret-coder special brainkiller"!