Showing 1253 open source projects for "mysql-connector-java"

View related business solutions
  • Grafana: The open and composable observability platform Icon
    Grafana: The open and composable observability platform

    Faster answers, predictable costs, and no lock-in built by the team helping to make observability accessible to anyone.

    Grafana is the open source analytics & monitoring solution for every database.
    Learn More
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 1
    JConfigura is a library usable in java environments for sharing configuration parameters between different java applications. Moreover it exculpates developers of aspects like property file reading and securing property files with rsa encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    JHide
    JHide is simple steganography tool aimed to demonstrate basic steganography techniques.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 3
    Cryptographic Java library for creating, maintaining, persistence and use of cryptographic entities.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    ABouncer for Spring Security provides a convenient and robust web interface for managing Users, User Groups, Authorities, ACL lists and more
    Downloads: 0 This Week
    Last Update:
    See Project
  • Incredable is the first DLT-secured platform that allows you to save time, eliminate errors, and ensure your organization is compliant all in one place. Icon
    Incredable is the first DLT-secured platform that allows you to save time, eliminate errors, and ensure your organization is compliant all in one place.

    For healthcare Providers and Facilities

    Incredable streamlines and simplifies the complex process of medical credentialing for hospitals and medical facilities, helping you save valuable time, reduce costs, and minimize risks. With Incredable, you can effortlessly manage all your healthcare providers and their credentials within a single, unified platform. Our state-of-the-art technology ensures top-notch data security, giving you peace of mind.
    Learn More
  • 5
    XTEA (eXtended Tiny Encryption Algorithm) support for db4o open source object database. XTEA is a block cipher that operates on a 64-bit block size with a 128-bit key. An extremely tiny but very fast encryption algorithm (with cycles less than 32 rounds)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Encrypting Safe
    This is free Java desktop application to keep your note in safe from others using the Encrypting Decrypting symmetric key algorithm, it's easy to transfer your note form source to another in confidential manner.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    OhPass Password Generator
    Tiny but powerful java-based password generator, with different options for password length, use of numeric, alphanumeric or special characters randomly chosen. OhPass automatically copies the generated password to the clipboard.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    The Secure Mobile Agents (SeMoA) platform constitutes a secure runtime environment for Java-based mobile software agents.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    ANts P2P
    ANts P2P realizes a third generation P2P net. It protects your privacy while you are connected and makes you not trackable, hiding your identity (ip) and crypting everything you are sending/receiving from others.
    Downloads: 7 This Week
    Last Update:
    See Project
  • Field Service+ for MS Dynamics 365 & Salesforce Icon
    Field Service+ for MS Dynamics 365 & Salesforce

    Empower your field service with mobility and reliability

    Resco’s mobile solution streamlines your field service operations with offline work, fast data sync, and powerful tools for frontline workers, all natively integrated into Dynamics 365 and Salesforce.
    Learn More
  • 10
    DAD is a Windows event log and syslog management tool that allows you to aggregate logs from hundreds to thousands of systems in real time. DAD requires no agents on the servers or workstations. Correlation and analysis is driven through a web front end.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    DROID FINDER
    DROID FINDER will help you to track your phone, identify the user taking a picture using the front camera (i.e. if available) and provide the geographic positioning of the device sending you a SMS with a google maps link.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    TextConverter is a graphical text editor allowing the user to encrypt/decrypt the textual contents displayed on the screen using a 128-bit AES (Advanced Encryption Standard) cipher.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    JMassLogProcess is an next generation SIEM solution, based on high performance syslog and snmp trap collector(up to 20,000 logs/s),Distributed File System(Hadoop),Complex Event Processing Engine and ZK …….
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    An open source Java/Java Card implementation of the ISO7816 and related PKI standards.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Konfidi is a trust framework that uses topical trust values from a social network of authenticated people. When you receive an email from someone you do not know, but he/she is in the network, Konfidi will compute an inferred trust value for you.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Jalapa is an extension to the security model of Java, that allows for specifying, analysing and enforcing history-based usage policies. Programmers can sandbox an untrusted piece of code with a policy, enforced at run-time through its local scope.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Java implementation of the most commonly used algorithms for exact string matching, where the pattern is given first.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    A library if Java utilities including LDAP authentication, Queuing Engine etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Tombo Edit is an Android application to view and edit files encrypted by Tombo (http://tombo.sourceforge.jp/En/)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    opacity
    The Open Protocol for Access Control Identification and Ticketing with privacY, is a standard suite of Key Establishment and Authentication protocols based on ECC and AES, for optimized contactless transactions and simple PKI based Key management.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Honeypots for servers, VoIP, social networks and web applications
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    JaasLounge provides various platform-independent JAAS LoginModules and Windows SSO for Java EE application servers.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23
    The project Jaulp is jet another utility library project written in Java. It contains utility classes for Date ,Calendar, Collections, Resources, Files, IO for Random data, and many more. This is the last version for this project.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Java Web Application Intrusion Monitor
    JWAIM is a security framework for Java Web Applications. It provides modules and interfaces to add monitoring, firewall and IPS capabilities in the application server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Blocked based Multi Identity Cryptographic Storage (BMICS) is a storage method that stores encrypted data of multiple users within a BMICS file without giving away details of the users in an explicit manner unless decrypted with the correct key.
    Downloads: 0 This Week
    Last Update:
    See Project