Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.
Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
Start Free
Build Securely on AWS with Proven Frameworks
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
jmailto is a tiny Java Applet which can be used to replace HTML's native "mailto:" tag. It aims to prevent Spam bots and harvesters from automatically collect (your) E-Mail addresses by searching the HTML source code of your page.
This is a java-written daemon that functionss as an e-mail to sms bridge. It periodically checks a POP3/IMAP account and sends a brief part of the new emails to a pre-configured sms-enabled mobile phone.
JFormMail is a generic HTML form to e-mail gateway that parses the results of any form and sends them to the specified users. This servlet has many formatting and operational options, most of which can be specified within each form, meaning you don't nee
Quick Mail Project is Mail Server with Web mail. The project is independed platform support designed Using Java ,C, PHP ,MySQL database . Its support RFC SMTP protocol , RFC Internet Message, Multi domains, forward, block, spam bulk and a lot more.
Easy, modular and flexible WAMP bundling Apache2/SSL, MySQL4, PHP4, Perl5.8/ASP, Python2.3, Tomcat5, FirebirdDB, FileZilla, Mail/News-Server, phpMyAdmin, Awstats, WordPress, etc. It also includes a web-GUI to control/manipulate all bundled services.
This small platform independent application (written in Java) is designed to encode your e-mail addresses, thus the
spam robots can not retrieve it from your page. Note that minimal HTML knowledge is needed to put the generated script into a html page.
The program is used for translating EPAL to P3P. EPAL is used for enterprise internal privacy policy definition, and P3P is used for covering all the aspects of web sites\' privacy policy. This program is used to keep these two privacy policies in sync.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Revival/2k is a modular BBS/suite of internet servers and a web-site management system. It consists of multiple web applications (forums, mail, login, etc), internet servers (NNTP, POP3, etc) and a Telegard/Renegade styled telnet server all interacting
eMATgine users can send download requests by mail or define their request
by http or wap. This project is transfered to http://sourceforge.net/projects/ematservices
Java based Multiaccess Device Independent (Mobile, Internet and Broadband) Portal Platform including Applications such as Mail, Calender, Contacts, News, Chat, Ringtones, Icons, SMS applications. All the software are WAP,GSM,PCS,GRPS and 3G Compatible.
"Phenix" can be seen as an portlet market place based on java and XML. Our first target is to build usefull portlets like content management, web mail or reporting tools which can be integrated into different portal servers like Jetspeed.
A pure Java-based FTP server with a complete security structure, virtual directories/roots, object-based internal representation of files, and designed to be seemlessly cross-platform. Additional wish-list items will be posted shortly.
Platform based on JMS queues to centralize System Event Messages (syslog) and Application Layer Messages, persisting them in several Databases and providing several pre- and post- processes according the message's nature, like encryption, mail.