Showing 2 open source projects for "fake"

View related business solutions
  • Our Free Plans just got better! | Auth0 by Okta Icon
    Our Free Plans just got better! | Auth0 by Okta

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
    Try free now
  • User Testing Platform | Testeum Icon
    User Testing Platform | Testeum

    Get worldwide testers to review your software, app or website! Quickly find bugs and usability issues in less than 48 hours.

    Tired of bugs and poor UX going unnoticed despite thorough internal testing? Testeum is the SaaS crowdtesting platform that connects mobile and web app creators with carefully selected testers based on your criteria.
    Learn More
  • 1
    Rescatux

    Rescatux

    Easy to use Repair distribution for both Gnu/Linux and Windows systems

    Rescatux is a GNU/Linux repair cd (and eventually also Windows) but it is not like other rescue disks. Rescatux comes with Rescapp. Rescapp is a nice wizard that will guide you through your rescue and repair tasks. When the wizard is not able to solve your problem you can also enjoy of Rescatux unique support features: * Chat: Open the chat for asking help directly in Rescatux channel. * Share log: After running an option you can share its log (the action registry that it has done) so...
    Leader badge
    Downloads: 1,386 This Week
    Last Update:
    See Project
  • 2
    Advanced Persistent Security

    Advanced Persistent Security

    Advanced Persistent Threat Security

    The architecture of the system is integrated by different Fingerprinting mechanisms. The system is designed from a core that avoids the detection of sdhash and Memory analysis Built-in security, allows anonymous browsing by filtering requests external identification, Exit Tor Nodes and using the TOR Fingerprinting structure The system is designed to navigate without being detected or registered by any search engine or online platform denying all types of response to servers, The...
    Downloads: 3 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next