General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.
Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
Try Free
Stop Storing Third-Party Tokens in Your Database
Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.
Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
NipperME or 'Nipper Made Easy', is a GUI application that sits on top of the commandline tool Nipper located at http://nipper.titania.co.uk/ This tool provides Nipper commandline options presented to you in a nicely laid out GUI.
mBuddy is a project with the initial goal of allowing users of mobile devices (Java, J2ME) the option to find others based on interests, diet & other factors. Objectives are to allow intelligent, conditional, secure exchange of contact info, A/V & more.
OpenVPN SysTray is a smart program enabling you to control OpenVPN from a self explaining graphical user interface. In addition, a password manager is supplied. Whenever you have to give your authentication information OpenVPN SysTray can do that for you
jover-managing will be an manager and system viewer Applikation in Java, which exchanges data via sockets. It will be written in Java. It also will step into the base OS System doing changes, killing prozesses and so on.
Yet another realtime or turns based, multi-user, strategy, diplomacy, trading and war game. SimU RT MPSG stands for Simulated Universes RealTime MultiiPlayer Strategy Game. P2P, CS or hybrid P2P/CS, browser interface (baseline), Java or (X)Win clients. N
Bonswing is a library/framework that uses Java Swing components to list updates to services in the network using Apple's Bonjour. By using Bonswing components, the developer does not have to worry about service discovery and can focus on the application
Toolkit (.NET/Mono) + GUI (GTK#) to administer and control a Conexant Encore ADSL Modem.
Its modular design allows to be extended to support other brands/models.
This is a Firewall and IDS front-end, the main purpose is simplify configuration of Iptables and Fwsnort and Psad management. The Firewall provides an experimental feature to decide in real-time about each outgoing connection.
Valkyrie-project is a realization of a group of students in training for Project Leader in Computer Science (CSIA) applied to the establishment Sciences-U.
This project will manage and visualize corporate networks.
Netkeeper is an integrated intrusion prevention system for Linux. It incorporates snort IDS and iptables firewall, and its distributed and modularized design allows deployment in various network topologies.
The Traffic Control Configurator is a Java tool for configure the Linux tc. You can configure it in Graficalmode or with Terminal in Textualmode. The configuration can export to well structured ShellScript or as xml File.
Racoon is an application server for multi-player games. Its intention is to relieve game developers from recurring and time extensive tasks. This is achieved with a modular concept: only the game logic has to be written and deployed in Racoon.
Hyper-M is a bluetooth based DHT peer-to-peer infrastructure for J2ME (CLDC1.1/ MIDP2.0) enabled handphones. Hyper-M allows the user to create a peer-to-peer network and share and retrieve files on this network. Has been tested mainly on Nokia handphones
Servers Development Kit (SrvDK) is an open source library, written in C#, for quick creation of effective and robust multi-client TCP servers. NOTE: This is work in progress, so far the application is NOT yet usable!
VeriNeC (Verified Network Configuration) is a network configuration management application. It allows to import configuration, simulate and verify the network and distribute configuration to devices.
jMARS is a java implementation of the famous "Core Wars" application first described by A.K. Dewdney. Using eXtreme Programming combined with Java, EJB, and the Rich Client Platform it can be used as an educational tool to understand these technologies
SipSpy is a distributed monitoring tool for SIP networks. SpyAgents run on each of the nodes to be monitored, and a SipSpy connects to each of these nodes, receiving information and displaying it in real-time for all the SIP packets monitored.