With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Gen AI apps are built with MongoDB Atlas
The database for AI-powered applications.
MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
NetworkService is a Java network API that simplifies development of LAN-based applications. It allows programmer to build locatable, state-monitorable software modules and exchange data between them in a peer-to-peer fashion. These modules can be given 'meaningful' names (Tom, FileServer1, Printer2..etc) instead of static IP address.
NetworkService's project also provides SawaTalk - a server-less chat application (bundled with the final version of NetworkService ). SawaTalk has...
SonicReader is used to view and save reports of the internals of a Sonicwall Configuration file. This is useful for those people that wish to know the settings within their saved Sonicwall Configs. I have no affiliation with Dell Sonicwall. Please do not contact Dell Sonicwall regarding the use of this program.
CustomADMX is a set of Group Policy Templates for various 3rd party software including Adobe Reader X, 7-Zip, Skype, etc. Supported operating systems: Windows Vista/7, Windows Server 2008/2008 R2
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Visual MIB Browser that supports getting the MIB from RFC, managing the MIB, running SNMP operations (v1/v2/v3) with MIB, discovering SNMP devices, graphing MIB variables, visualise MIB as tree, view MIB as UML classes, save MIB data in pdf/xls/text
Java Library used to connect and read data from a DStream server. Primarily for the Dark Ages of Camelot game.
Users of this library can bind actions to certain events. The event is triggered when certain packets are recieved from the server.