Showing 68 open source projects for "java mysql"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Grafana: The open and composable observability platform Icon
    Grafana: The open and composable observability platform

    Faster answers, predictable costs, and no lock-in built by the team helping to make observability accessible to anyone.

    Grafana is the open source analytics & monitoring solution for every database.
    Learn More
  • 1
    DAD is a Windows event log and syslog management tool that allows you to aggregate logs from hundreds to thousands of systems in real time. DAD requires no agents on the servers or workstations. Correlation and analysis is driven through a web front end.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    JMassLogProcess is an next generation SIEM solution, based on high performance syslog and snmp trap collector(up to 20,000 logs/s),Distributed File System(Hadoop),Complex Event Processing Engine and ZK …….
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Server/client suite which provides per-user access control/firewall/QOS. Robust and high speed implementation is secure against MAC/IP spoofing, and can scale to large networks with many clients. Options for additional monitoring and captive portal.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Software solution for creation and verification of digitral signatures. Can replace tokens and smart cards with mobile phones. Components included are client and server. Can creates, verifiy and store content and signatures. Offers secure sharing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5
    Login
    Login system! mySQL /JDBC Demonstrates the use of secured Hash functions in java
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    Patronus is a distributed system written in Java dedicated to protect local networks. It ensures that chosen security policy is not ignored on each host which is under Patronus's control.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    An open-source configurable virtual testbed (based on the Eucalyptus cloud platform) for Intrusion Detection System Evaluation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Laika analyzes and reports on the interoperability capabilities of EHR systems. This includes the testing for certification of EHR software products and networks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    BlueOxygen Debus is the security implementation of tree for BlueOxygen Cimande. Originally this is a Cimande Security, but we found that there is several security that we can implement and we must test it, so we decouple it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Rent Manager Software Icon
    Rent Manager Software

    Landlords, multi-family homes, manufactured home communities, single family homes, associations, commercial properties and mixed portfolios.

    Rent Manager is award-winning property management software built for residential, commercial, and short-term-stay portfolios of any size. The program’s fully customizable features include a double-entry accounting system, maintenance management/scheduling, marketing integration, mobile applications, more than 450 insightful reports, and an API that integrates with the best PropTech providers on the market.
    Learn More
  • 10
    The purpose of eAudit is to provide a comprehensive reporting capability relating to Electronic Auditing for various industries.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    scratchpad promject
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    The goal is 3D game engine. I will also want to have a 2D version of the same thing :) People will like multi-choice for 1 game =p ScarNastics 3D game build on jMonkeyEngine[jME2, 2009] ScarNastics 2D game build on a personal home build written by Sonis
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    EasyCrypter is JAVA application for data encryption. Encrypt your files in several easy steps.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    A Java Based Implementation from project n2h2p An URL Filtering Server for N2H2 Compatible devices
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    BioWebAuth (Biometrics for Web Authentication) is an open source Java framework intended to provide single sign-on web authentication based on BioAPI-compliant biometric software or devices. It uses the JA-SIG Central Authentication Service architecture.
    Leader badge
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    A product which would help you walk the thin line between security and user-friendliness.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    SMScryptor encrypts and decrypts messages sent from any mobile phones using : - AES 256 encryption - J2ME MIDP2.0 CLDC1.1 - ECMAScript - Apache / PHP / mysql
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    StrongKey is a building block in an Enterprise Key Management Infrastructure (EKMI), with the goal of centrally managing symmetric encryption keys.
    Leader badge
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    tool collection to manage files and stuffs on a filesystem
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Console of administration WEB for clients with installed ClamWin. The objective of this project is to use an opensource software, and generate a comprehensive solution of Antivirus. The antivirus ClamWin was selected. The project is a Web interface for a
    Downloads: 2 This Week
    Last Update:
    See Project
  • 21
    This project has moved. Please see http://projects.darkaslight.com/ SAM is a near real-rime Snort alert monitor. SAM provides many ways to indicate that you may be experiencing an intrusion attempt on your network.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    The Secure Java Code Filter (SJCF) provides an ICAP-based filter mechanism for mobile Java code and the signatures applied to it. Administrators can define a centralized policy determining which applications and signatures respectively are allowed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Legalfinger is a bunch of Java-based software including a set of portable software installed inside an USB finger to protect any digital content copied onto the USB finger.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    jHomeNet is a home automation client/server application written in Java used to monitor and control sensors and devices around your house. The application uses of a number of existing communication technologies including Dallas Semi's 1-Wire and X-10.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    The goal of this project is to create an expandable secure content store along the lines described by JSR 283 supporting an access model, which incorporates both discretionary and mandatory access controls.
    Downloads: 0 This Week
    Last Update:
    See Project