With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Build Securely on Azure with Proven Frameworks
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Infranet is a system that attempts to circumvent web censorship by allowing clients to surreptitiously request sensitive content via cooperating Web servers distributed across the global Internet.
startx is the project name for an interface build in php which takes the output of some products like MRTG or awstats or ACID... and put them together in the same Web interface.
The goal of the Symbiosis project is to develop software which allows people to communicate, share knowledge, and learn. The primary subject of learning will be the Buddha Dharma, but it will be possible to use it for other subjects also.
The NEO Project uses the NEO-c (Network Exchange Operation for Charity) platform to participate in various computing challenges and projects, and donates any winnings to the charities specified by its users.
Manage sources of video (i.e., from a security camera), recording clips where motion has been detected, and allowing those clips to be replayed.
Variable lead-in/out time, motion detection, logging.
JECC is an open source implementation of public key Elliptic Curve Cryptography written in Java. As of now it provides en-/decrypted out- and input streams.
JavaIDMEF is an implementation of IDMEF in Java originally developed by Chris McCubbin. The Intrusion Detection Message Exchange Format (IDMEF) describes the structure and transport facility of information between IDS and management.
Lizard Cart CMS offers an easy way for people with limited HTML experience to manage the content and products of their websites.It uses PHP/MySql/Java Script comes complete with a WYSIWYG online editor.
A similar to Tripwire, file system integrity checking tool but develop in java and cross platform.
This tools checking and source control using check sum algorithm like MD5, SHA and CRC.
A secure collaborative framework that is being used by other projects such as CFAgent (online customer service), CFWeb (pure HTTP communication for CFAgent) and much more in addition to serving as a standalone all-in-one collaboration platform by itself.
The JPass.org project relates to the development of a system for authenticating user's identity, more specifically, for providing identity authentication methods using non-reusable and non-reversible one-time IDs.
LDAP Enabled Application Framework(LEAFs), is a J2EE based application framework that couples a strong security model with MVC. The security of LEAFs is modeled after the TCSEC Class 2 (C2) security specification.
The Filters project team are building API's which will filter malicious input to applications that is used to launch various attacks. The filters will sanitize input rendering it harmless and detect specific attacks. This project will develop imple
SyncShare Server is a secure messaging and real-time collaboration
platform. Build solutions to connect people, data, and applications through
firewalls and mobile devices. It handles all networking, security issues and lets
one focus on the business
A Java library for validation of credit cards. Implements the Luhn Algorithm to ensure the card number is well formed, checks card type prefix's and length. The rules are stored in a text file allowing new cards to be added without changing the source
An Experimental Platform for Secure Peer Services, QARE uses a decentralized trust model, a Public Key Infrastructure and provides single logon for multiple applications running across multiple systems. WAR files are used to add applications.
Peekabooty is a peer-to-peer application which can route web page requests around firewalls. This is done by asking hosts in the network that are not censored to fetch censored web pages.