With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Grafana: The open and composable observability platform
Faster answers, predictable costs, and no lock-in built by the team helping to make observability accessible to anyone.
Grafana is the open source analytics & monitoring solution for every database.
libdvdetect provides fast database lookup for DVDs
...What the library does not provide is DVD ripping and decryption. It reads the structure (e.g. titles and chapters) and generates a special checksum to look up the database.
More details at http://www.dvdetect.de. The database can also be searched using a web browser at http://search.dvdetect.de/.
For those who are curious I suggest downloading the binaries from https://sourceforge.net/projects/libdvdetect/files/binaries/ to try it out (windows only).
This project is a simple GUI wrapper for lsdvd and vobcopy. It allows you to copy DVD vobs to a single vob file, suitable for transcoding to your favourite video format. Check out the wiki for more http://apps.sourceforge.net/mediawiki/streamcap
SKL myBurner is a simple text-mode CD/DVD/Blu-Ray burning tool.
Writing modes:
DIR -> CD
ISO -> CD
Dir -> DVD
ISO -> DVD
DISC -> ISO
Erase disc
Information: makay.jozsef@gmail.com
Site: http://skl-projekt.hu
This project is for the Device Drivers and user-space tools for the <a href=
http://www.centurion-cd.com/product-dischub.html>Centurion DiscHub.</a>.
The device is a 100 CD+-RW/DVD+-RW/DVD-RAM drive with a robotic 100 Disc changer.
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.