One platform to build, fine-tune, and deploy ML models. No MLOps team required.
Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
Try Free
Auth0 B2B Essentials: SSO, MFA, and RBAC Built In
Unlimited organizations, 3 enterprise SSO connections, role-based access control, and pro MFA included. Dev and prod tenants out of the box.
Auth0's B2B Essentials plan gives you everything you need to ship secure multi-tenant apps. Unlimited orgs, enterprise SSO, RBAC, audit log streaming, and higher auth and API limits included. Add on M2M tokens, enterprise MFA, or additional SSO connections as you scale.
CivilAction lets you create a Choose Your Own Adventure type story that can be played on Java enabled cell phone. A desktop application lets you write story files. People run the story on their phone. Make a 'Tresure hunt' or 'Amaze Race' type game.
deface-no-tnx is an anti-defacement system that monitors your Web files and notifies you about unallowed changes. It also replaces the defaced page with a standard "error" page,so that no offensive/joking content can be frauodolently added to your site
aamFetch is a utility for fetching your anonymous esub nym messages from the alt.anonymous.messages newsgroup (or other newsgroups). It allows multiple encrypt-subjects to scan, multiple "destination files" to save messages to and random chaff downloads.
Quickly encrypt and decrypt your files with Petri. View encrypted text and image files containing your passwords or other sensitive information. Petri is written in Java and therefore runs on any operating system supporting the Java Runtime Environment.
Cryptographically secure your files with asymmetric and symmetric keys, as well as password based encryptions and file/text checksums. Use upto 6 different keys to encrypt/decrypt and get checksums using MD2, MD5, SHA1, CRC32, etc..
GUI written in java to make configuration files for ipsec (racoon and setkey) on linux. It is intended to be as simple and intuitive as possible, but with some advanced features.
Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
A java application that allows you to store files into a "data store". These files are encrypted by passphrases and padded with random garbage to provide plausible deniability (you cannot know if there are any more files in the store or not).
A plattform independent encryption-tool with a simple user interface (swing/java). It uses 'Password Based Encryption' (PBE) to encrypt and/or decrpyt files on the filesystem. Encryted files will also be compressed using the zip-format.
This proyect is an implementation of OpenPGP (RFC2440) written entirely in Java. It let's you sign, encrypt, decrypt messages and files, using public key cryptography.
A Java program to encrypt files and make them relatively safe for transfers across networks. Currently just in commandline form, but an application is in the works.
crcRepair is a utility that is able to fix corrupt files by consulting a database and file mirrors. It is written in pure Java, so it can be used on all platforms with the Java JRE installed.
Sniffer Server - decodes TCP streams and captures packets in general
The captured content may be saved to files or sent to a client over TCP/IP connection (self-defined protocol)
sfick (pronounced as "s-fick") is a two part software system whose function is to assist system administrators with the process of verifying the integrity of critical files. Given a system compromise, system administrators must be able to verify the integ
<b>IVJ MUD (Masive Multiplayer Text Game) is a SSL-based soft:<br>-Client (GUI)<br>-Server (GUI)<br>-Applet (GUI)<br>-Protocol (SSL-based, use of localization files that store strings to reduce trafic and allow for instant i18n.<br>
LOOKING FOR HELP!</b
Simple Encoder/Decoder, written in the .net framework.
It is basicly an encryption program which supports serveral encryption methods.
It can encode or decode texts in the forms of files or just plain text written directly in the program.
Java class file encryption. Class Encrypt is a program that can encrypt a developer's class files and package them into an executable jar file for deployment. The program uses modules for implementing different encryptions.
The Secure Remote Log Monitor (SRLM) project provides client and server
utilities that collect application or system log files from multiple systems over an untrusted network onto a central server for analysis and action.
An Experimental Platform for Secure Peer Services, QARE uses a decentralized trust model, a Public Key Infrastructure and provides single logon for multiple applications running across multiple systems. WAR files are used to add applications.
We at GCD are here to bring you ease in decoding your friends CRYPTIC GeekCode .signature files -=). Also sometime in the future we plan to eventualy start an ENCODER to help you even more!
Open eSign allows software developers and technical parties in a company to create secure, online (web-based) forms and documents that follow a business process flow and enable legally recognized electronic signatures using digital signature technology.