Visual IP is a network protocol
analyzer that works in any operating system with a java VM. At the
moment it only allows you to examine data from the disk, and created
by tcpdump. You can interactively browse the capture data, viewing
summary and det
Open3SP is a unique system administration framework that provides a secure administrative infrastructure based on the SSH protocol. The aims of the project are to establish role based access, automated configurations and software/patch deployment.
jRevProxy is a lightweight reverse proxy server fully written in Java. jRevProxy accepts HTTP and HTTPS requests and translates these into new requests based on a set of rules. HTTPS with client side authentication (X509 certificates) is supported.
ObscureEncrypt is a high level security encrypter. It encrypts at three levels, 448 bit Blowfish encryption, Obscurity, high level encryption. Making it almost impossible to decrypt
Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Java security module using JAAS with JDBC. A Pluggable Authentication Module (PAM) using database store user information. Contains implementation over Tocam Realm, JBoss JAAS. Sponsored by http://knowledgesurf.com.
JVerify is a Java app that enables you to monitor for changes in any file on your Unix system, most notably executable binaries, thus alerting you to a possibly backdoored binary. It runs on any platform that supports JSDK 1.4.x and has a MySQL database
startx is the project name for an interface build in php which takes the output of some products like MRTG or awstats or ACID... and put them together in the same Web interface.
Access competitive interest rates on your digital assets.
Generate interest, borrow against your crypto, and trade a range of cryptocurrencies — all in one platform.
Geographic restrictions, eligibility, and terms apply.
The goal of the Symbiosis project is to develop software which allows people to communicate, share knowledge, and learn. The primary subject of learning will be the Buddha Dharma, but it will be possible to use it for other subjects also.
The NEO Project uses the NEO-c (Network Exchange Operation for Charity) platform to participate in various computing challenges and projects, and donates any winnings to the charities specified by its users.
Manage sources of video (i.e., from a security camera), recording clips where motion has been detected, and allowing those clips to be replayed.
Variable lead-in/out time, motion detection, logging.
JECC is an open source implementation of public key Elliptic Curve Cryptography written in Java. As of now it provides en-/decrypted out- and input streams.
Lizard Cart CMS offers an easy way for people with limited HTML experience to manage the content and products of their websites.It uses PHP/MySql/Java Script comes complete with a WYSIWYG online editor.
A similar to Tripwire, file system integrity checking tool but develop in java and cross platform.
This tools checking and source control using check sum algorithm like MD5, SHA and CRC.
A secure collaborative framework that is being used by other projects such as CFAgent (online customer service), CFWeb (pure HTTP communication for CFAgent) and much more in addition to serving as a standalone all-in-one collaboration platform by itself.
The JPass.org project relates to the development of a system for authenticating user's identity, more specifically, for providing identity authentication methods using non-reusable and non-reversible one-time IDs.
LDAP Enabled Application Framework(LEAFs), is a J2EE based application framework that couples a strong security model with MVC. The security of LEAFs is modeled after the TCSEC Class 2 (C2) security specification.
The Filters project team are building API's which will filter malicious input to applications that is used to launch various attacks. The filters will sanitize input rendering it harmless and detect specific attacks. This project will develop imple
A Java library for validation of credit cards. Implements the Luhn Algorithm to ensure the card number is well formed, checks card type prefix's and length. The rules are stored in a text file allowing new cards to be added without changing the source
An Experimental Platform for Secure Peer Services, QARE uses a decentralized trust model, a Public Key Infrastructure and provides single logon for multiple applications running across multiple systems. WAR files are used to add applications.