With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Desktop and Mobile Device Management Software
It's a modern take on desktop management that can be scaled as per organizational needs.
Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
This is an experimental program that encrypt/decrypt/divide/join files. This program uses a new algorithm made by me, this algorithm is experimental and I working on it, every day this algoritm will be better.
A simple but fully-featured implementation of the simple Caesar Cipher encryption algorithm, specifically 'rot13' - Caesar with a factor of 13. Supports file and tty input/output, internationalisation, and also includes a shared library.
Cryptar is a cryptographic network backup program that is able to be very efficient with network resources by using an algorithm derived from the rsync algorithm. It uses SHA-1 hashes to verify (sign) its data and AES to encrypt it.
The Tiny Encryption Algorithm (TEA) was developed by David Wheeler and Roger Needham at the Computer Laboratory of Cambridge University. The variant used was developed by David Wagner. TEACrypt 80x86 is the porting of this algorithm to the 80x86 platform
Ideal for manufacturers, engineers and PCB designers
Altium Designer offers a unified environment that empowers engineers with a single view of every aspect of the PCB design process including schematic, PCB layout, harness design, and documentation. By accessing every tool in one place, engineers can complete their entire design within the same intuitive environment and quickly deliver high-quality products.
sha is a file hashing utility that uses the NIST's SHA-1, SHA-256, SHA-384, & SHA-512 hash algorithms. It can be used for file integrity checking, remote file comparisons, etc. The portable algorithm implementations can be useful in other projects too.
I needed a library of functions that enabled me to perform hash
functions and symmetric cryptography. I chose MD5 initially but
eventually chose SHA as the hashing algorithm due to concerns regarding
the \'collision resistance\' of MD5 due to weakne
SysK allows to crypt text by using system informations calculate the algorithm.
For each user,the crypt algo will be different.
It's written in C language for Linux x86.
The objective is to allows it to crypt streams, binaries and more.
Upgrade your productivity with your own free AI Meeting Assistant
Fathom records, transcribes, highlights, and summarizes your meetings so you can focus on the conversation. Get setup in minutes.
Fathom records, transcribes, highlights, and summarizes your meetings so you can focus on the conversation. Get setup in minutes. When the call ends you have instant access to the call recording, fully transcribed, along with all of your highlighted moments. All recordings created with Fathom are 100% private. They can only be seen if you share your recordings or highlights with others. Show, not tell, with playlists of what “good” sounds like. Metrics help identify who needs help and who is outperforming. A unified view of all conversations with a customer or prospect. Simplify the handoff from sales to success and never lose any context if a team member departs. Reduce time your team spends on data entry with automated post-call data sync with your favorite CRM.
KCrypto is a KDE2 file encryptor.
It uses the Rijndael ( block cipher algorithm AES winner ) public domain c++ class implementation written by Szymon Stefanek , and it is capable of
encrypting and decrypting every kind of file ( text and binary ) i
sectar: a program that creates encrypted tape archives(tar files), using the AES algorithm Rijndael. Encryption exported under exemption TSU 740.13.
Was star, now sectar.
Java Chaotic Random Number Generator - Inspired by chaos theory, the intent of this generator is to produce unseeded, unpredictable numbers. The numbers will not follow a predictable sequence and will not rely on a pseudorandom algorithm.
Set of useful tools for payment service development
The BP-Tools set consist from applications supporting EFT testing, benchmarking and transaction service development. BP-Tools suite currently consists of following three components:
- BP-CCALC: Cryptographic Calculator
- BP-CardEdit: Thales P3 Input/Output file editor
- BP-EMVT: EMV Tool
- BP-HCMD: Thales HSM Commander