With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Secure remote access solution to your private network, in the cloud or on-prem.
Deliver secure remote access with OpenVPN.
OpenVPN is here to bring simple, flexible, and cost-effective secure remote access to companies of all sizes, regardless of where their resources are located.
An umbrella project for static data repositories, such as ISO country codes, currency codes, and more to come. For each subject, there will be three stages: data gathering, java repository implementation, generation of files for other technologies.
No-Nonsense Code-to-Cloud Security for Devs | Aikido
Connect your GitHub, GitLab, Bitbucket, or Azure DevOps account to start scanning your repos for free.
Aikido provides a unified security platform for developers, combining 12 powerful scans like SAST, DAST, and CSPM. AI-driven AutoFix and AutoTriage streamline vulnerability management, while runtime protection blocks attacks.
aRSync is "Another RSync" and provides a pure javaimplementation of the rsync algorithm. This implementation is intended to be ready to use for file transfer, to be easy to extend for further use cases and - most important - to become productive.
This project has the intention to support MVP with MVVM patterns in a new framework for desktop or web applications. This framework support an MVP or MVP-VM implementation. More info at http://javamvpvmframework.blogspot.com
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Program to performing the complete cycle of neural networks analysis: preparing data, choosing neural network (CasCor, MP, LogRegression, PNN), learning of network, monitoring learning state, ROC-analysis, optimization of network parameters using GA.
generic voting system implementation targeted for small and medium enterprise election which provides multiple kind of election fully secured and traceable on java service platform and web application client
Carbon is a java based SERVER implementation which caters to different server falvors eg: raw data,HTTP, FTP and so on.
Spawning off from Carbon are different server implementations for HTTP/SOCKS proxy, FTP, HTTP, J2EE which are available in a jar.
Implementation of "online" erasure codec for Hadoop Distributed File System (HDFS). It contains native C library integrated with Java code base of HDFS.
Agent based Regional Crawler strategy implementation - gathers users' common needs and interests in a certain domain. It crawls based on these interests, instead of crawling the web without any predefined order.
Software for graphs visualization, encouraging graph algorithms implementation. Aimed at students who want to code their own algorithms and see a graphical representation of it working.
This open source software is provided for configuration and loading of device services developed to the JavaPOS architecture and standard.
Note: The project is now hosted on GitHub (https://github.com/JavaPOSWorkingGroup). Libraries are provided by trough Bintray (https://bintray.com/javaposworkinggroup/maven) and Maven Central (http://search.maven.org/#search|ga|1|org.javapos).
jamod is an object oriented implementation of the Modbus protocol, realized 100% in Java. It allows to quickly realize master and slave applications in various transport flavors (IP and serial).
"Java Textual Desktop" project stands for the classical TEXT screen with javaimplementation inspired with Curcus which used for decades in the history of UNIX (linux).
TPMitigation is a transparent HTTP-proxy for mitigation of drive-by-malware. Content is converted on-the-fly and/or replaced where there is a risk of a infection by embedded drive-by-maleware. Also visit http://tpmitigation.sourceforge.net/
As leJOS, leJOS RT is a replacement firmware for LEGO Mindstorms RCX and NXT bricks. This is a fork of leJOS 0.8.5 with RTSJ (Real-Time Specification for Java) implementation.