Grafana: The open and composable observability platform
Faster answers, predictable costs, and no lock-in built by the team helping to make observability accessible to anyone.
Grafana is the open source analytics & monitoring solution for every database.
Learn More
Our Free Plans just got better! | Auth0
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Originally a software partnership between my best friend and myself, Diverse Developments seeks to write "useful stuff", of a very diverse nature...
Current projects include a file encoder, and a double-entry accounts package.
Re-implementation of the Revelation Password Manager in Java
As the original Revelation Password Manager seems to be dormant, and Gnome 3 removed it's greatest feature, the taskbar applet, and having a lot of passwords in the revelation format, re-implementing the password manager in Java seemed like a good idea. YMMV. The goal is to have a common underpinning to allow quick addition of file formats, storage locations and platforms by using Java.
This program makes it possible to transfert files from a computer to another via SSL/TCP/IP. It is composed of a part to listening of possible requests, the server, and of one or more customers. Pure Java program.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Time-stamp of a created file can be modified by attacker. This project is meant to track File timestamp values , using NTFS data structures rather than trusting the original time stamp modified by attacker.
This project will be used for the identification of the thumb impression. We will be having a image of thumb in our database and will use another image for matching purpose. We can also match the images which are not in the data base.
It's a modern take on desktop management that can be scaled as per organizational needs.
Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
Meergoose is a multi-use social suite of applications that allows users to setup a portal on their personal computing platform that encrypts and stores files locally and synchronizes encrypted files with a secure cloud.
MeerCrypt is a component of Meergoose and is opensource. The vision is simple: Encrypt Locally. Share Remotely. YOU remain in control of your security, your keys, your data.
The iText based PDF sCramblEr allows you to encrypt a PDF using one or more public certificates of the addressees (one or more .cer files). For each .cer file, you can enforce specific PDF permissions: (dis)allow printing, (dis)allow modification,...
One of the project groups in Intake 6 is planning on doing a IM client which is secure. This includes messenging, file sending, picture drawing, video transmissions by far.