With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
Try free now
Free CRM Software With Something for Everyone
216,000+ customers in over 135 countries grow their businesses with HubSpot
Think CRM software is just about contact management? Think again. HubSpot CRM has free tools for everyone on your team, and it’s 100% free. Here’s how our free CRM solution makes your job easier.
This software shall enable users to send / receive denyable messages: Nobody can prove a message is from / for a specific user.
Messages can be made private (by using password) or are public.
All messages have an expiration time/date / event
Intended for Developers to highlight their security weak coding and show them how attackers can abuse these weaknesses.
Refer to the following web sites for directly viewing training movies online.
http://yehg.net/lab/#training
http://core.yehg.net/lab/#training
Java implementation of Chi-Square Attack and LSB Enhancement Attack
Chi-square attack is the most commonly known and used statistical attack in steganalysis. LSB enhancement attack is also the most widely known visual attack in this area. This project includes implementation of these two methods in java.
Payroll Services for Small Businesses | QuickBooks
Save up to 50% on QuickBooks Online! Keep the Accounting and Book Keeping for your Small Business up to date!
Easily pay your team and access powerful tools, employee benefits, and supportive experts with the #1 online payroll service provider. Manage payroll and access HR and employee services in one place. Pay your team automatically once your payroll setup is complete. We'll calculate, file, and pay your payroll taxes automatically.
This project aims to provide an open source Matlab-based development framework to conduct side-channel attacks. Part of this framework are Matlab classes, functions, scripts, and demos.
Securing mails without involving user. Secures them as often as possible if it is possible. Shows security-state and process of mails and mail-partners.
The J-WASTE project aims at the implementation of a platform independent client/server Java implementation of the WASTE protocol. This project started as a mandatory project course in networking at the Luleĺ University of Technology in Sweden.
Peer Agent is a system that enable a group of users to carry out automated complex interaction via email services without relying on a trusted third party.
Visual IP is a network protocol
analyzer that works in any operating system with a java VM. At the
moment it only allows you to examine data from the disk, and created
by tcpdump. You can interactively browse the capture data, viewing
summary and det
Secure remote access solution to your private network, in the cloud or on-prem.
Deliver secure remote access with OpenVPN.
OpenVPN is here to bring simple, flexible, and cost-effective secure remote access to companies of all sizes, regardless of where their resources are located.
One of the project groups in Intake 6 is planning on doing a IM client which is secure. This includes messenging, file sending, picture drawing, video transmissions by far.