Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Download Now
Custom VMs From 1 to 96 vCPUs With 99.95% Uptime
General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.
Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
File system/directory monitoring utilities with loggin and task processing support (can execute files or make a WCF service call). Multiple configuration options. Source code libraries can be used to create a custom file system monitor.
The JWA library aims to provide a conversion from C to Delphi of as many headers as possible from the PSDK etc. The JWSCL (security library) is an advanced object-oriented framework for programming with the Windows security features (ACL, Tokens, etc.)
Fetches proxies from hidemyass and changes system proxy in real time.
...The proxy application fetches the best proxies from hidemyass.com and changes the system proxy configuration in realtime.
Features:
1.It work on all windows systems(both32bit and 64bit)
2.It has no dependencies
3. Uses the wininet Api to change system proxy
4. It is less than 700kb
5. Proxy can be changed by either hotkey or userdefined time intervals.
6.Easy and simple GUI
**THIS PROJECT IS NO LONGER MAINTAINED**
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
This toolkit has complete security Package start from Tweak manager , Updater , Virus scanner ,Proxy server and many more This will be help full for user from corporate to small user we have already started working on it will completed with 2 months
DAD is a Windows event log and syslog management tool that allows you to aggregate logs from hundreds to thousands of systems in real time. DAD requires no agents on the servers or workstations. Correlation and analysis is driven through a web front end.
Velo is an open Identity and Access Management platform, with many IDM services such as provisioning, access control, password synchronization, audit & compliance, self service interfaces and much more.
Corporate Data Protection and Network Security is a IT project targeting policy-based and fully-automated data protection, encryption and transmission. We plan to create self-diagnostic risk-predict enterprise environment with artificial intelligence.
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
OW.NET -- 1-Wire API port from Java (and J#) to C#. Use the Dallas 1-Wire and iButton chips with standard C# using a serial adapter (also CF.net) or the TMEX drivers on the Windows platform. No J# distribution installation required.
Cnc's IP Data Volume Report:
Logs IP to IP contact, number of packets, bytes, time of contact, Ethernet too!
View via local web interface.
Very simple for those who want to view who your computer is contacting the most!
Open eSign allows software developers and technical parties in a company to create secure, online (web-based) forms and documents that follow a business process flow and enable legally recognized electronic signatures using digital signature technology.