With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Automate contact and company data extraction
Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.
Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
This is the fastest encryption tool for Windows, it allows you to encrypt whole hard drives or incredibile large and multitude of files in the matter of seconds.
Now you can quickly protect your files and folders with password and prevent anyone from opening them.
Source Code available here: https://asmodatfolderlocker.codeplex.com/
Project is entirely opensource, you can change it if you wish to what suits your purposes best, or send me email to request a new feature. All ideas and propositions are welcome.
Requirements:
-Windows 7 or later
Light encryption algorithm (technique) that can be used in real time video encryption.
(source code has been uploaded; You can read attached pdf file for more details about the presented encryption technique ! )
...It should be impossible to prove an image contains a hidden file (if you use a strong password and only use 1 or 2 bits per pixel component).
NOTE: This project has been moved to Google Code.
http://code.google.com/p/2pix-steganography
A file encryption program created specifically for the soul purpose of security. This program is completely free and open-source, but the source code may only be distributed by Zinga, unless authorized.
Total Network Visibility for Network Engineers and IT Managers
Network monitoring and troubleshooting is hard. TotalView makes it easy.
This means every device on your network, and every interface on every device is automatically analyzed for performance, errors, QoS, and configuration.
This library provides two operations: one to wrap key data, and another to unwrap the key data. This code also includes a fairly comprehensive unit test library which ensures the implementation is verified against the vectors provided in RFC 3394.