Protect your business with AI policies and data loss prevention in the browser
Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
Download Chrome
Gen AI apps are built with MongoDB Atlas
The database for AI-powered applications.
MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
The file recovery process is not an easy task to run on Linux and Unix based OSes and there`s almost no good user interfaces for end users, so that`s why, El Recuperador, is intended to make a generic Web-based GUI framework based on forensics informatic
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
One of the project requirements is to be able to digitally sign parts of the IPC 1752 XML documents before it is electronically transmitted between two business partners.
Freesite Insertion Wizard is a java utility with AWT GUI for inserting freesites (DBR, Edition, FEC support). Contains a lot of help at each stage of the process, and includes site verification to increase availability of the inserts.
An Iris Recognition system written in Java. Acquires an image, locates the iris and produces a unique 'iris profile' for it. Will be fully supported by its own GUI but potentially linked into other applications, such as xlock.
The Eclipse XML-Security Plug-In allows you to experiment with the W3C recommendations on digital signatures and encryption and to learn all about their background. Arbitrary XML documents can be canonicalized, signed, verified and en- or decrypted.
INTIX-JSIGNER is a java web application for signing documents (XML and/or PDF) of unattended way and in the server side. It has as main modules the following: Authentication, XML and PDF Signing and Keys and Certificates Management.
Vcn = Virtual computer Network will protect your computer from all malware and hackers by setting up 3 virtual empty computers and the integrated vpn for privacy will protect you from isp eavesdropping and other people interrested in tracking you
PassReminder is a free password manager. It KEEPS PASSWORDS SECURE. Then it is easy to remember login and password for forum, operating system, bank... Download it!
Imagine being able to send an encrypted message as a single file to someone working on any Operating System, without them having to install any software to decrypt it. Just send them an Inkjar. Or you can store your own passwords on a usb key anywhere.
The Moonbounce API is a set of high level objects that encapsulate pieces of the Bouncycastle lightweight crypto API. Moonbounce significantly simplifies RSA key generation, signing, encryption/decryption and verification of both byte arrays and files.
Private-key, symmetrical (same password to encrypt and decode) file encryption with 8-bit to 2147483647-bit (2^3 to 2^31) encryption using my own algorithm and my own extension of MD5 (http://blog.robtoth.net/2009/06/tencryption-computer-programming.html
Java version of the excellent KeePass password keeper. KeePass is the primary app; this project just gives access to the database on other platforms. Current platforms: Java Swing, SuperWaba.
Compute shared RSA keys for two parties using Gilboa's protocol. Other protocols may be added. Contains JAVA source for Benaloh, Naccache-Stern and Goldwasser-Michali crypto-algorithms. Oblivious transfers and BiPrimaliy tests also implemented.
A Java based HTTP/HTTPS proxy for assessing web application vulnerability. It supports editing/viewing HTTP messages on-the-fly. Other featuers include spiders, client certificate, proxy-chaining, intelligent scanning for XSS and SQL injections etc.