Protect your business with AI policies and data loss prevention in the browser
Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
Download Chrome
Our Free Plans just got better! | Auth0
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
A P2P filesharing client which connects to the Gnutella network.
Phex is a P2P filesharing client which connects to the Gnutella network. It is multi-plattform and malware-free. It offers advanced functionalities and integrates all common Gnutella extensions like multi-source downloads and advanced search features
This Project shows how to create a mobile smartphone app with a gnutella p2p application.
It consits of smartphone java sourcecode, documentation, phex source code, phex proxy and instructions to create a working app.
This project once was coded with only 2000€ buget and has given revenue of over 30.000€. Happy hacking the java,perl,php code.
Other...
FiShNet is a P2P file sharing application written in Java. It has a server as well as client so that it can be used to create private file sharing network.
This program makes it possible to transfert files from a computer to another via SSL/TCP/IP. It is composed of a part to listening of possible requests, the server, and of one or more customers. Pure Java program.
AI-Powered Security and IT Operations Without Compromise.
Built on the Graylog Platform, Graylog Security is the industry’s best-of-breed threat detection, investigation, and response (TDIR) solution. It simplifies analysts’ day-to-day cybersecurity activities with an unmatched workflow and user experience while simultaneously providing short- and long-term budget flexibility in the form of low total cost of ownership (TCO) that CISOs covet. With Graylog Security, security analysts can: