Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Download Now
Stop Storing Third-Party Tokens in Your Database
Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.
Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
Data Evolution for Java. Finch is a Data Transformation System based on JDBC and other Java blessed specifications. Finch is based on a component task architecture allowing users to create complex data manipulation jobs.
Build System for Java offers an enhanced build environment that ties together deployment instructions, environment configuration and sourcecode as a releaseable entity. A new paradigm for configuration management!
ARIO is a C++ library for reading and producing archive files, which are commonly used as libraries of relocatable object files. See also ELFIO project.(http://sourceforge.net/projects/elfio)
The Local Content Server transforms Plone into a robust Learning Object Repository. It supports IMS content package transport, content preview, and object identification and registration.
This program makes it possible to transfert files from a computer to another via SSL/TCP/IP. It is composed of a part to listening of possible requests, the server, and of one or more customers. Pure Java program.
A human-readable ISC-Licensed implementation of the LZO1X algorithm.
LZO is a compression library which is widely used around the world. The main problem with LZO is that it is absolutely not human readable.
People have done crazy stuff to get LZO to run in their language. Usually it implies inline assembly or trying to execute data which actually contains machine code. This is sick. Whoever is responsible for this sorry situation ought to be ashamed.
So I'm going to deobfuscate LZO and provide a ISC implementation of this algorithm in Python and C. In...