Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
Rinecrypt uses the Gladman implentation of the AES algorithm
Rijndael and a SHA256 hash among other things, to encrypt/decrypt
a file with a user supplied passsword.
ESOSI (Employment of Secret-Sharing for Object Security in Intranets) offers a security solution for companies and authorities. It extends the eCryptfs file encryption system by adding Secret-Sharing, smartcard support and a Linux Security Module (LSM).
Secure P2P Instant Messenger running on .NET Framework 2.0. Uses server to store user information (user name, password, email address, friends list, log in state, IP address) in encrypted form. Uses custom designed symmetric encryption algorithm.
This library provides two operations: one to wrap key data, and another to unwrap the key data. This code also includes a fairly comprehensive unit test library which ensures the implementation is verified against the vectors provided in RFC 3394.
This tool encrypts text using polyalphabetic codetables, like the encryption systems in the middle ages. It can be used for simple text encryption with a small password or as a One-Time-Pad with a random codetable for 100% secure text encryption.
The IEEE 1619 Committee open-source reference implementations of encryption algorithms, plus testing and certification suites, for each encryption algorithm included in the standard.
Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
otp.el is a one-time-password implementation in emacs lisp, suitable for generating one time passwords with the MD5 algorithm. It's designed to be plugged in to tramp.
talkLock is voice encryption software for your cell phone. talkLock includes a server component so that you own all points of encryption and decryption of your communications.
JSRSA is a Javascript/PHP implementation of RSA algorithm which help you to simulate SSL-Like secure data transmission over the net as easy as possible !
A hook script usable with TortoiseSVN (and possible other subversion clients/GUIs) providing transparent repository encryption (encryption/decryption at the client side).
A very powerful and secure encryption supporting multilevel algorithm hierarchy encryption(bit level),supports infinite length keys and equation creation utility(secondary key) for the utmost security.Support for multiple algorithms.All OS support(ja
This its a simple project of the RSA algorithm. The purpose of this project isn't to develop an impressive program, it's an easy understand of the algorithm and the C programing.
UKey is an extension to the open-source encryption tool: TrueCrypt. With UKey you can use a USB key as replacement password for TrueCrypt. Currently the project is in a 'proof of concept' state, meaning it does work but it is not meant for daily use.
Simple multi tool for scouts. It contains:
chat server
chat client
encryption tool
simple www browser
simple www editor
e-mail client (for sending messagess)
mass e-mail sender
Written in VS2008
This package is a modest implementation of a non-alphanumeric encryption algorithm in java. But I'm kinda looking forward to creating a whole gui app implementing most well-known encryption tools, "the paranoid secret-coder special brainkiller"!
SJEA version 1.0 - Simple Java Encryption Algorithm. SJEA is a simple command-line binary encryption algorithm (symmetric block cipher) written in JAVA. It uses a password and a byte-vector array to scramble the input file.
platform independent solution to encrypt files on a portable Device. Files will be encrypted with TripleDES and hold in an XML-File. No local Installation needed.
The PowerCiph Data Encryption Algorithm is a versatile, yet simplistic, encryption algorithm/protocol. The ultimate goal of the algorithm is simplicity, compactness, and a lack of prerequisites.
This program is a replica of SafeSex by Nullsoft. Written from scratch on the .NET Framework 3.5.
It allows you to keep useful notes in a safe manner, as it allows for encryption using the world renowned AES encryption algorithm.
An encryption/decryption engine which can encrypt any file(text, pdf , doc, rtf , gpg , mp3 , mp4 etc..) or any data on your PC such that only you with the valid password can decrypt it.Also it will compress the file while encrypting it.