Put idle assets to work with competitive interest rates, borrow without selling, and trade with precision. All in one platform.
Geographic restrictions, eligibility, and terms apply.
Get started with Nexo.
Custom VMs From 1 to 96 vCPUs With 99.95% Uptime
General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.
Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
The Aegis VM Project is an on-going effort to implement a lightweight,
secure virtual machine for executing Java bytecode. It will eventually feature a
modular architecture, Proof Linking, that supports pluggable
verification modules.
A robust and reliable user management sub-system is critical to an enterprise application system. Esecurity is a web services-based user management component that provides services for user authentication, access control, user profile management etc.
Java Mechanic can modify public, private and protected fields and activate methods of live running apps. Also decompiles,or saves any objects or source code. Using a built in java code interpreter, objects can be created on the fly. Contains many tools.
Execution monitor for Java Applications.<br/>
BERSERK implements the Intercepting Filter design pattern. <br/>
Allows composing and runtime editing of execution flow and intercept services with access control, logging or any user-defined filters.
This project provides an interface to Sun's JCE (Java Cryptographic Extensions) as a JSP taglib. It brings strong encryption algorithms such as AES and Blowfish to your JSP applications. It uses the bouncycastle.org cleanroom JCE 1.2.1 implementation as
sfick (pronounced as "s-fick") is a two part software system whose function is to assist system administrators with the process of verifying the integrity of critical files. Given a system compromise, system administrators must be able to verify the integ
Compliant and Reliable File Transfers Backed by Top Security Certifications
Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.
Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
TLogin is a java login applet for tomcat that uses a database to track login attempts and the source of those attempts. Tlogin provides features for preventing web based password guessing attack by placing temporary locks on the account after every fail
The Entitlements Library provides for the enforcement and administration of application software entitlements or permissions. The Administration component permits the creation of roles and is Servlet based.
Secrets is a complete, standalone, personal encryption solution that works much like PGP (Pretty Good Privacy). With Secrets you can encrypt information before emailing it to a friend or coworker, or before storing it on a removable disk. Secrets is buil
This project is an attempt to design strongly typed langauge like C# or Java using capability security model. This is an reseach project. This project is also a temporary home for async-objects projects which is prototype of classes for asynchronous inte
External library for the Apache project Axis implementing UsernameToken spec from the working draft Web Services Security Username Token Profile ver1.1(Sunday, 26 Janurary 2003)
A security framework for providing AAA functionality for Avalon based applications.
The pluggable architecture for underlying datastores and Authentication, Authorization and Auditing Managers provides a flexible, extensible framework.
Java class file encryption. Class Encrypt is a program that can encrypt a developer's class files and package them into an executable jar file for deployment. The program uses modules for implementing different encryptions.
Sanctum allows you to run virtual servers on your computer so you can test the security of software by actually breaking into it. Developers just create a virtual server image and let hackers download it and try their hardest to find exploits.
Open3SP is a unique system administration framework that provides a secure administrative infrastructure based on the SSH protocol. The aims of the project are to establish role based access, automated configurations and software/patch deployment.
This project is aimed to provide good support of smartcard readers for Linux/Unix users. In contrast to MUSCLE we try to implement our drivers as
portable as possible and currently focus on Towitoko drives.