Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Download Now
Stop Storing Third-Party Tokens in Your Database
Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.
Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
IslandEv distributes a Genetic Algorithm (like <a href="/projects/jaga">JaGa</a>) across a network (see <a href="/projects/distrit">DistrIT</a>) using an island based coevolutionary model in which neighbouring islands swap migrating individuals every
The SoftwareGroupNG project is an interactive website, targeted at bringing to the foreground of the software industry, Nigerian developers who are capable or are ready to learn to use the latest software technologies to design, implement and deploy solu
With Javastarter it's easy to create executables for Windows to start java applications.
The JVM is dynamically detected and invoked via JNI. The project contains C++ sources which can be customized to generate an individual java launcher.
A Framework and "controlled" Platform for the development and deployment of independent plugin modules. Possible applications are limitless, but networking and convenience are emphasized.
Java based system modification detector with jdbc database backend.
Software will notify administrators when monitored files are updated or tampered with.
The integration of the VM on most OS is not very deep: It sits on top of the OS, running as a simple app, and does not access most features of the OS. This project's aim is to deeply integrate with the OS to facilitate many services.
Mudslide provides an encrypted file system to any operating system that can mount a webdav server. Mudslide works with Linux, OS X, and Windows. Mudslide is built upon http://jakarta.apache.org/slide/ and the encryption libraries packaged with Java.
WISL performs network performance measurements
and dynamically generates sounds (music) that represent the current
state of the network. It is highly extensible: individuals can
contribute soundpalettes or measurement modules.
JDirDiff is a GUI tool that compares two directories and merges differences.
JDirDiff is a 99% pure java utility, uses swing for front end. uses Xerces ()
for xml parsing (jdirdiffrc: resource configuration file for personal options).
A Java implementation of the Common Gnutella2 Standard specification. The Treehouse Project provides a generic framework for P2P applications that use the Gnutella 2 infrastructure for distributed computing.
The Cocoon Adaption Kit is a NetKernel module which enables the use of Cocoon Components (Generators, Transformers, Serializer, Actions) from within the NetKernel XML Application Server.
source2source is a source code sharing application that enables users to share and search for source code of a specific programming language among users on its own network.
apt-got builds and supervises a partial (or full) Debian mirror, that is filled on-the-fly by apt-get requests. But there's more! Its modular mirror engine is ready for customized mirroring algos. So you can easily make your own module! (Eg for apt4rpm)
netMANj is a network management software built on SNMP that is programmed in Java. It uses the OpenMap library from BBN for certain capabilities. It includes a set of libraries written from scratch for performing ASN encoding etc