Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Download Now
Fully Managed MySQL, PostgreSQL, and SQL Server
Automatic backups, patching, replication, and failover. Focus on your app, not your database.
Cloud SQL handles your database ops end to end, so you can focus on your app.
JBTWatch is a Java Library used to communicate with Bluetooth Watches such as Sony Ericsson MBW-100 or MBW-150. It uses BlueCove to communicate and is responsible to handle the AT commands send from and to the watch.
This project is a collection of three different programs, regarding: 1) a program to include context-sensitive ranking when querying on a database, 2) a program for estimating relative importance in networks. 3)Search of services in a sensor network
Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.
Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
SipSpy is a distributed monitoring tool for SIP networks. SpyAgents run on each of the nodes to be monitored, and a SipSpy connects to each of these nodes, receiving information and displaying it in real-time for all the SIP packets monitored.
This is a Java implementation of the driver for communicate with a ZigBee network. This driver has the capabilities to create a communication with a Coordinator node, discover the nodes on the ZigBee network, receive and send command to any of this nodes
Infect is a network traffic classification tool, that classifies TCP protocols. The classification is based on ML techniques. Scen: Train/Recognize arbitrary protocols (SSH, HTTPS..), Detect policy violations (e.g. tunnels)
A server network is created where if a new server is introduced into the network, it seamlessly integrates with the existing ones in a way that is not made known to the users of the service - web apache servers are used to process client request.
Async message based communication system for different languages
Different implementations of a JSON based protocol for interchange of messages between different programming languages in a peer to peer fashion.
Currently Java and Javascript support, but more coming.
Bonswing is a library/framework that uses Java Swing components to list updates to services in the network using Apple's Bonjour. By using Bonswing components, the developer does not have to worry about service discovery and can focus on the application
FreeACS is Free Auto-Configuration Server. The project has just started, but we hope (and plan) to provide a free (GPL) full implementation of the CPE WAN Management Protocol (CWMP).
OpenVPN SysTray is a smart program enabling you to control OpenVPN from a self explaining graphical user interface. In addition, a password manager is supplied. Whenever you have to give your authentication information OpenVPN SysTray can do that for you
A Java based high performance CIFS Proxy Server that provides handlers for each type of CIFS packets to the user. In essence it provides a generic CIFS/SMB packet sniffing, logging and handling ability by providing simple Java APIs to the users.
mBuddy is a project with the initial goal of allowing users of mobile devices (Java, J2ME) the option to find others based on interests, diet & other factors. Objectives are to allow intelligent, conditional, secure exchange of contact info, A/V & more.
This project intends to make a SOCKS compatible tunnel proxy which communicates to the server part, running on your nameserver, over standard DNS (UDP) protocol. That way you can bypass network firewalls allowing no other IP traffic but DNS.
Hyper-M is a bluetooth based DHT peer-to-peer infrastructure for J2ME (CLDC1.1/ MIDP2.0) enabled handphones. Hyper-M allows the user to create a peer-to-peer network and share and retrieve files on this network. Has been tested mainly on Nokia handphones
VeriNeC (Verified Network Configuration) is a network configuration management application. It allows to import configuration, simulate and verify the network and distribute configuration to devices.
jMARS is a java implementation of the famous "Core Wars" application first described by A.K. Dewdney. Using eXtreme Programming combined with Java, EJB, and the Rich Client Platform it can be used as an educational tool to understand these technologies
Free open-source 100% Java DHCP Server: general purpose DHCP server ranging from a simple LAN server to a wide range WAN server handling millions customers. Focused on reliability, performance and expandability. It uses the dhcp4java api.
Nubric (Near-real-time user behaviour and resource interaction control) is a framework for security and authentication-related modules written in Java. Its origin focus lies on network monitoring, dynamic, transparent firewalling and traffic control.
Java library for X-Way and/or UNI-TE communication.
PROJECT HAS MOVED HERE: https://github.com/Elektordi/x-way-uni-te
X-Way and UNI-TE (also used in Unitelway) are communication protocols for old Schneider Electrics PLCs (Programmable Logic Controllers), formerly "Modicon Télémécanique".
The aim of this open-source project is to create a Java library to send and receive such data, because there is actually no open-source project at all in this field.
Keep in mind that those protocols are old and not maintained anymore by any company,...