With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Secure remote access solution to your private network, in the cloud or on-prem.
Deliver secure remote access with OpenVPN.
OpenVPN is here to bring simple, flexible, and cost-effective secure remote access to companies of all sizes, regardless of where their resources are located.
Hammer of Thyrion (uHexen2) is a cross-platform port of Raven Software's Hexen II source. It is based on an older linux port, Anvil of Thyrion. HoT includes countless bug fixes, improved music, sound and video modes, opengl improvements, support for many operating systems and architectures, and documentation among many others.
Cross-platform reimplementation of AMOS BASIC (runtime)
XAMOS is a cross-platform reimplementation of AMOS BASIC based on jAMOS, fully re-written in C++ with SDL libraries.
Currently runtime only, however is widely compatible with jAMOS projects.
FreeMAX is a M.A.X.: Mechanized Assault & Exploration mod that allows you to play M.A.X. with the Stratagus engine, as opposed to play it with the original M.A.X. one. So you need to have a legal copy of M.A.X.(original DOS Version required).
Proof That Carma Always Gets You Back Nvidia / Cuda Developer Directed Of Course To The Confusion And Scare Tactics Of Haters This Only Gets Better And Tighter And Even More Creative The Design Feed Of Sound The Whole Idea
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.