With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Keep company data safe with Chrome Enterprise
Protect your business with AI policies and data loss prevention in the browser
Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
SimAlgPro - it is a tool to simulate the main algorithms for processor planning. to contribute to the learning process. It allows visualize of interactive form the algorithm application and results.
ObscureEncrypt is a high level security encrypter. It encrypts at three levels, 448 bit Blowfish encryption, Obscurity, high level encryption. Making it almost impossible to decrypt
Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
A mobile agent framework. Instead of relying on protocols across the wire, send an agent to the server to execute.
An example is encryption: send an agent to retrieve data, but let it do the encryption. Client side encryption on the server!
jui is a tool for creating Java GUI layout components. It has a powerful but simple layout algorithm and support for the Swing look and feel guidelines.
Simulated annealing package written in Java using simplex downhill algorithm from Numerical Recipies in C++/FORTRAN/C
It is intended for use "behind the scenes" in applications, and it is optimised for ease of integration.
Completely standalone,
The Athlete is a virtual robot living in the ODE (Open Dynamics Engine)world. An evolution algorithm is implemented based on the DR-EA-M to optimize its performances. This involves a Genetic algorithm, network of neurons and morphology. All is in java.
Java class file encryption. Class Encrypt is a program that can encrypt a developer's class files and package them into an executable jar file for deployment. The program uses modules for implementing different encryptions.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
I needed a library of functions that enabled me to perform hash
functions and symmetric cryptography. I chose MD5 initially but
eventually chose SHA as the hashing algorithm due to concerns regarding
the \'collision resistance\' of MD5 due to weakne
A fast, simple method of establishing musical genre of arbitrary compressed audio files calculated by comparisons with training sets. Program currently consists of a java console program. GUI front end, algorithm upgrades to come.
a java chat system, that encrypts all transfered data to protect the users privacy. Encryption will be done by rsa, blowfish, 3ds or an easy 'exclusive or' encryption. the client will hava a complete gui, the server in addition a console frontend.
A similar to Tripwire, file system integrity checking tool but develop in java and cross platform.
This tools checking and source control using check sum algorithm like MD5, SHA and CRC.
A small chat Program written in Java, which allows you to speak "privately" to other users. It shall get an encryption and a compression. I plan to integrate a dcc-like file-transfer
'Einsatz' is a free Java based application to plan medical services. Using the 'Maurer Algorithm' it calculates the staff and equipment you need for services like sporting events or concerts.
This project comprises a collection of libraries and applications for the field of program analysis. The starting point is a type analysis for Java programs using Agesen's Cartesian Product Algorithm.
MAGMA: Multiobjective Analyzer for Genetic Marker Acquisition
A genetic algorithm for generating SNP tiling paths from a large SNP database
based on the competing objectives of cost (number of SNPs) and coverage (haplotype blocks):
Hubley R., Zitzler
This toolbox is designed to make implementations of voting systems freely available in Java. It will initially have software for Single Transferrable vote (Meek algorithm), but others may be included.
SysK allows to crypt text by using system informations calculate the algorithm.
For each user,the crypt algo will be different.
It's written in C language for Linux x86.
The objective is to allows it to crypt streams, binaries and more.
A Java library for validation of credit cards. Implements the Luhn Algorithm to ensure the card number is well formed, checks card type prefix's and length. The rules are stored in a text file allowing new cards to be added without changing the source