With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Dominate AI Search Results
Generative Al is shaping brand discovery. AthenaHQ ensures your brand leads the conversation.
AthenaHQ is a cutting-edge platform for Generative Engine Optimization (GEO), designed to help brands optimize their visibility and performance across AI-driven search platforms like ChatGPT, Google AI, and more.
Features of Cyberarmy.com brought direct to your desktop. They don't want it, so this projects kinda dead, wish I hadn't started it so early haha. Any ideas for an alternate purpose (not an IM client): jwinsatt@adelphia.net
Overcoat encrypts your projects exe file before distribution (for shareware authors for example), that limits the use of an exe file, and forces the user to purchase/registar after a certain developer defined period
AI-Powered Security and IT Operations Without Compromise.
Built on the Graylog Platform, Graylog Security is the industry’s best-of-breed threat detection, investigation, and response (TDIR) solution. It simplifies analysts’ day-to-day cybersecurity activities with an unmatched workflow and user experience while simultaneously providing short- and long-term budget flexibility in the form of low total cost of ownership (TCO) that CISOs covet. With Graylog Security, security analysts can:
A command line utility written in Visual Basic to assist system administrators at institutions such as schools to minimise the use and storage of inappropriate material in Server shares. User-definable rules for file deletion can be created.
Clouseau for SQL Server is designed to aid system administrators (SAs) and Microsoft SQL Server database administrators (DBAs) in the identification and resolution of various vunerabilities found within Microsoft's enterprise database server:
Fully managed relational database service for MySQL, PostgreSQL, and SQL Server
Focus on your application, and leave the database to us
Cloud SQL manages your databases so you don't have to, so your business can run without disruption. It automates all your backups, replication, patches, encryption, and storage capacity increases to give your applications the reliability, scalability, and security they need.
A utility that lists all URLs in a user's Internet Explorer cache. The list can be exported to a text file or copied to the clipboard. Written in Visual Basic for most Windows versions.
OpenSSL Digest frontend for Windows. This program can be used to create/verify MD2/MD4/MD5/SHA/SHA1/MDC2/RIPEMD160 checksums of your files. OpenSSL32 now supports file encryption/decryption using various encryption Ciphers, such as Blowfish, Idea, DES,
The chgpw utility changes account passwords on machines across a peer-to-peer LAN. Shows how VB.NET can make interop calls to some of the Net API functions.
Direct Connect Hub Script Creator - Designs Custom Scripts For The DC Hub - Chose Options And Then Hit Preview So You Can See Script Before It Is Actually Written - 20 Operator Functions And 4 Levels Of OPs So Each Level Can Be Given Different Powers
The File Shredder securely shreds files by overwriting them before they are deleted. Every character in the file is overwritten with customised random data, so it is secure, but a little slow. The file is also given a random name.
ISO 17799 - Code of practice for information security management. Creation of methodology and documentation for audit adapted to ISO. One is made up of an introduction on general aspects of the security of the information.
The Program Killer is a Delphi 6 program that monitors the Process List on Windows 95/98/Me and Windows NT4/2000/XP for unauthorized EXE files (User Definable) and if found, those Processes are Terminated via the Windows API.
Passlog is a Visual Basic program to allow windows access to be logged to syslog. While it is not intended to be a high security program it can provide some basic security and logging of user logins.
This will be a project that allows the secure storage of authorization, such as passwords as user names for any computer program that requiers the task of memorizing the authorzation infomation.
A number of tools to enhance management/coding of NFR (http://www.nfr.net) IDA, and various other admin tools that can be used for both NFR and hand coding other appliance scripts.
RanPass 2.0, the successor to the simple and MS-DOS interfaced RanPass 1.0. RanPass is a Random Password Generator. RanPass will use a unique Algarythm(s) to generate a Random Password. This type of software is really useful to a Secure Network.
Pi is a encrypted, distributed file sharing, IM, and Multi-User Chat tool that is backwards compatible with existing Gnutella networks, and allows for the creation and discovery of Gnutella channels.
Originally a software partnership between my best friend and myself, Diverse Developments seeks to write "useful stuff", of a very diverse nature...
Current projects include a file encoder, and a double-entry accounts package.