Showing 655 open source projects for "java operating system"

View related business solutions
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    The database for AI-powered applications.

    MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
    Start Free
  • Simple, Secure Domain Registration Icon
    Simple, Secure Domain Registration

    Get your domain at wholesale price. Cloudflare offers simple, secure registration with no markups, plus free DNS, CDN, and SSL integration.

    Register or renew your domain and pay only what we pay. No markups, hidden fees, or surprise add-ons. Choose from over 400 TLDs (.com, .ai, .dev). Every domain is integrated with Cloudflare's industry-leading DNS, CDN, and free SSL to make your site faster and more secure. Simple, secure, at-cost domain registration.
    Sign up for free
  • 1
    Please note: not having time to complete jSai myself; I came across the ACEGI project which I now recommend instead. jSai; a Servlet Authentication Implementation. jSai aims to allow easier to use, more powerful authentication for Java Servlets.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    OS based on Agent based Security with a new type of split kernel and agents platform.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Blah.security is a J2EE oriented security framework for enterprise applications.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    SocketSwitchboard is a virtual proxy, router, or VPN. It uses an XML configuration to map incoming traffic on one or more ports to designated hosts and ports on the LAN or on the Internet. It supports complex boolean access restrictions and SSL.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 5
    Provides efficient, effective implementations of 32- and 64-bit hash functions based on Rabin fingerprints / irreducible polynomials, in Java. Also provides integration with java.security.MessageDigest API.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    A robust and reliable user management sub-system is critical to an enterprise application system. Esecurity is a web services-based user management component that provides services for user authentication, access control, user profile management etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    sfick (pronounced as "s-fick") is a two part software system whose function is to assist system administrators with the process of verifying the integrity of critical files. Given a system compromise, system administrators must be able to verify the integ
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    A client-server-system for distributively editing and signing documents. (technologies: Java, Java Servlets / JSPs, EJBs)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Quark is a simple Java based SSH client, featuring tabbed connection windows.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    Execution monitor for Java Applications.<br/> BERSERK implements the Intercepting Filter design pattern. <br/> Allows composing and runtime editing of execution flow and intercept services with access control, logging or any user-defined filters.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Sniffer Server - decodes TCP streams and captures packets in general The captured content may be saved to files or sent to a client over TCP/IP connection (self-defined protocol)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Radius Client coded in java (RFCs 2865 and 2866 compliant).
    Downloads: 3 This Week
    Last Update:
    See Project
  • 13
    jSmithy Single Sign On project. In just time containts only custom and LDAP/ActiveDirectory authorizations.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    1. project name eXPimenttk (e-SecureOffice) 2.Language Java (req. - at least j2re) 3.target platform - Cross-platform software 4.problem we want to sole- Encryption, Decryption software, File eraser, Messenger, Mailer,Remailer,FireWall 5 target - user
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    It is a small java eclipse plugin. This software makes workspace backups and restores them. You can use this plugin as workspace switcher too.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    SWM (Secure WebMail) is an applet that provides confidentiallity and authentication in webmail applications using SHA/RSA algorithms. It can accompany virtually every webmail application, but comes with a plugin for squirrelmail and can run standalone.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    OSA::net project main goal is to create an extensible, scalable framework for management of security related devices in middle-sized and large computer networks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    This project is an attempt to design strongly typed langauge like C# or Java using capability security model. This is an reseach project. This project is also a temporary home for async-objects projects which is prototype of classes for asynchronous inte
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Web Server Protection and Analysis Tool
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    JPassGen is an usefull strong password generator for secure login protection. (GPL / Java Swing / JNLP)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    OpenElection is a secure election management system encompassing ballot creation/localization, voting terminal management, vote counting, and key management. Written using Java and Swing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Yet another alarms program with features as file modification alarm (maybe useful for security auditories), alarms file saving possibility and of course time and date alarms. This time written in java.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    A Java-based client-server architecture for processing network intrusion detection data. The server receives XML alerts from Snort sensors buffers them for review by clients. The console provides a real-time view of IDS activity.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Generic clustering/load-balancing platform (over a LAN or internet) using java based P2P Aorta workers that execute java "tasklets". Various tasklets can be implemented to solve fractals, process images, render webpages, crack RSA "brute force".
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    OceanStore is an architecture for a global-scale file system which uses erasure coding, cryptography, and Byzantine agreement to provide available, highly durable storage in a peer-to-peer environment.
    Downloads: 0 This Week
    Last Update:
    See Project