With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
Try free now
Manage printing in a cost-efficient and eco-friendly way with Gelato.
Gelato offers an extensive catalog of custom products, a zero-inventory business model, and free designing tools—all in one place.
The world's largest print on demand network with 140+ production partners across 32 countries. Gelato offers end-to-end design, production and logistics for individuals looking to start their own business today!
Sniper is a powerful keylogger component that can be easily integrated in applications. It is a small,easy-to-use ActiveX control that encapsulates all the complexity for logging keys and exposes a few important properties and methods.
MAximized Risk COntrol (MARCO) supports security professionals and security consultants in building up an enterprise specific Risk- and Control Matrix. So it helps to identify and handle potential risks and mitigate them via properly defined controls.
Nuhe Client is a project related to the Nuhe Action Capable Log Monitor. This GUI client simplifies the administration of sensors and node managers, making it easier to control and monitor the network. Comes with a rule editor as well as a log monitor.
Payroll Services for Small Businesses | QuickBooks
Save up to 50% on QuickBooks Online! Keep the Accounting and Book Keeping for your Small Business up to date!
Easily pay your team and access powerful tools, employee benefits, and supportive experts with the #1 online payroll service provider. Manage payroll and access HR and employee services in one place. Pay your team automatically once your payroll setup is complete. We'll calculate, file, and pay your payroll taxes automatically.
TorCI is a controller GUI for Tor with advanced features and customization capabilities. You can browse anonymously using the Tor network while maintaining full control of the traffic on the Tor network.
The ultimate anti-virus and anti-spyware solution! It acts as a firewall for windows programs, never needs updating and allows you take control before they can harm or infect your system.
RemCom is RAT [Remote Administration Tool] that lets you execute processes on remote windows systems, copy files, process there output and stream it back. It allows execution of remote shell commands directly with full interactive console.
X10 Server for controlling X10 devices and an X10 Client for connecting to the X10 Server allowing user create/edit devices remotely in their home and control these devices remotely all over a secure channel using DES and Public key cryptography methods.
Tiger Security Application is an attempt at creating an application, using free or open sourced software, that will give a user the ability to control multiple desktop security applications from one central location.
Trusted by nearly 20,000 customers worldwide, and all major cloud providers.
OpenVPN's products provide scalable, secure remote access — giving complete freedom to your employees to work outside the office while securely accessing SaaS, the internet, and company resources.
OpenSessame is a personnel entry control and time tracking management system. Platform independent, multi-node, client-server system, written in Python, with wxPython/wxWidgets client, a web management gui and PostgreSQL database backend.
The goal of the project is to develop Role Based Access Control software which can be used in any application. The software can be deployed as a server which can cater to multiple applications. Rules can be written for fine grained access control.
Sistema para Control de Laboratorio de Computo
Con Visual Basic, SQL Server y Crystal Reports en Windows
Este sistema intenta controlar las entradas y salidas de los usuarios para que las computadoras solo sean usadas cuando realmente esta permitido.
TSIC is a comprehensive solution for secure Internet connection against all kinds of threats and harmful programs for Windows platforms and ReactOS. It's features include a built-in FIREWALL,IDS,Parental and privacy Control and also antivirus.
The MACA objective is to provide user authentication, session management and authorization services independently of platform. Authorization servive is based on a contextual role-based access control model that extends NIST RBAC
phpFreeLog is an advanced server logging tool written in PHP. Easy implementation and control allow you to take charge of how and when phpFreeLog will be used. Edit how the log will look through use of its built in scripting language and modular system.
IP Blocker is an incident response tool that automatically updates access control lists on Cisco routers and other devices. Web and command line interfaces are both supported, as is logging, email notification, and automatic expiration of blocks.
Role Manager is a security management framework based on the NIST model for Role Based Access Control (RBAC) and the Java[TM] 2 Platform security standards. The access control policies and the RBAC Model are implemented using the RBAC profile of XACML.
OpenPortalGuard is a flexible, extensible, and massively scalable access control system for portals. It provides single-sign-on features for username/pw and smartcards as well as declarative access control.
USRBAC is a kernel patch and userspace daemon that allows role based access control to be mitegated in userspace. The goal is to allow a secure way to impliment RBAC compliant security systems using a daemon in userspace
RemoteWAP gives you the ability to take control of a Linux Operating System from anywhere with a WAP enabled mobile phone. This project is being developed in Java. There is plans to support other Operating Systems such as Windows, Solaris, *BSD
A robust and reliable user management sub-system is critical to an enterprise application system. Esecurity is a web services-based user management component that provides services for user authentication, access control, user profile management etc.
Execution monitor for Java Applications.<br/>
BERSERK implements the Intercepting Filter design pattern. <br/>
Allows composing and runtime editing of execution flow and intercept services with access control, logging or any user-defined filters.
Development of an abstract API for easily building access control programs. The main program which will be built upon this API will serve as an access controller to the University of Brasilia InfoLab.
PATC is a client/server package for controlling internet access on public terminals (e.g., in a library). Users log in, and are given access to the internet with a time limit determined by the server.