Build gen AI apps with an all-in-one modern database: MongoDB Atlas
MongoDB Atlas provides built-in vector search and a flexible document model so developers can build, scale, and run gen AI apps without stitching together multiple databases. From LLM integration to semantic search, Atlas simplifies your AI architecture—and it’s free to get started.
Start Free
Build Securely on AWS with Proven Frameworks
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
This project contain chat server and chat client/admin that works on Windows/Unix.. This is a Free software. Developed by Osama Mohammad Oransa, 2009,contain 3 parts : Chat Server ,Admin and Chat Clients, Based on Java RMI, will support XMPP soon.
Software solution for creation and verification of digitral signatures. Can replace tokens and smart cards with mobile phones. Components included are client and server. Can creates, verifiy and store content and signatures. Offers secure sharing.
Java based webapp that utilizes TCP Wrappers to grant an IP access to a ssh server. Brute force attacks can be avoided while still allowing password based ssh access from multiple, changing IP values.
The project consist in an open source implementation of the W3C Recommendation of the XML Key Management Specification 2.0 XKMS 2.0. It is compound of a XKMS Server and a Client API to access to the Server via Web Service.
Secure remote access solution to your private network, in the cloud or on-prem.
Deliver secure remote access with OpenVPN.
OpenVPN is here to bring simple, flexible, and cost-effective secure remote access to companies of all sizes, regardless of where their resources are located.
jHomeNet is a home automation client/server application written in Java used to monitor and control sensors and devices around your house. The application uses of a number of existing communication technologies including Dallas Semi's 1-Wire and X-10.
Mock in the Middle is a Java Proxy designed for testing network applications. It serves as a mock proxy between a client and a server. By recording and replaying network conversations, the client can later be tested without a live server.
Cervantes (Certificate Validation Test-bed) is a client/server project that has been developed to test, develop and evaluate certificate revocation systems.
RevolvingProxy is a cross platform HTTP Proxy application that is designed to be installed on a server that has been assigned multiple IP addresses. Each connecting client is assigned a different IP address for security testing or other purposes.
Trusted by 150 million+ creators and businesses globally
Unlock Picsart's full editing suite by embedding our Editor SDK directly into your platform. Offer your users the power of a full design suite without leaving your site.
NetworkTools has 2 components: A protocol analyzer which plays a TCPclient or server or pipeline, which sits between a client and server and shows how they communicate. A port scanner can scan a range of IP addresses and ports. See screenshots.
Ncat - The culmination of many key features from various Netcat incarnations such as Netcat 1.10, Netcat6, SOcat, Cryptcat, GNU Netcat, etc. Ncat also has a host of new features such as "Connection Brokering", TCP redir (proxying), SOCKS client/server,
Java Based Cryptographic P2P Messaging Client, is based on a client-server architecture. The Client is made in SWING. The server is text based. Server keeps tabs on presense and the users public keys. Presentation: http://varun.accosted.net/talks.php
Portknocker is an easy to use, platform independant port knocking client. Our aim is support one easy to use client interface that support most popular portknocking server implementations.
Set of tools and libs for
managing structured data
in a very flexible way:
Imp./Exp. ASCII, XML, SQL,
PS, Tex/LaTex, RTF
GUI: X-Windows, MS-Windows
Interface to C++, DBs, Perl,
PHP, Java, TCP/IP
LISP-like interpreter
written in C++ using C-LIB
The J-WASTE project aims at the implementation of a platform independent client/serverJava implementation of the WASTE protocol. This project started as a mandatory project course in networking at the Luleĺ University of Technology in Sweden.
SACRED (Securely Available Credentials) is an IETF framework and protocol for credential portability to allow secure, authenticated access to security credentials. This project provides SACRED client and server implementations.
OpenFIM is an implementation of the authentication process involved in Federated Identity Management using secure SOAP. The server software has been developed using MySQL and PHP. The client software has been implemented in PHP, Java, .NET, and Perl.
JSecureTunneling is a Java SSH client that is entirely oriented in the management of SSH tunnels, offering the ability to establish secure and permanent tunnels to a remote SSH server, transparently just like a simple network connection.
A Java-based client-server architecture for processing network intrusion detection data. The server receives XML alerts from Snort sensors buffers them for review by clients. The console provides a real-time view of IDS activity.
<b>IVJ MUD (Masive Multiplayer Text Game) is a SSL-based soft:<br>-Client (GUI)<br>-Server (GUI)<br>-Applet (GUI)<br>-Protocol (SSL-based, use of localization files that store strings to reduce trafic and allow for instant i18n.<br>
LOOKING FOR HELP!</b
jRevProxy is a lightweight reverse proxy server fully written in Java. jRevProxy accepts HTTP and HTTPS requests and translates these into new requests based on a set of rules. HTTPS with client side authentication (X509 certificates) is supported.
The Secure Remote Log Monitor (SRLM) project provides client and server
utilities that collect application or system log files from multiple systems over an untrusted network onto a central server for analysis and action.