Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Download Now
Our Free Plans just got better! | Auth0
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
A framework for transferring implicit or tacit knowledge between members of a community. It works by observing the behavior of community members, and providing them with suggestions from other community members based on their past behavior.
For new versions, check https://github.com/Darkkey/javaNetSim
javaNetSim (Java Network Simulator) - it's a fork of a project jFirewallSim. The main goal of javaNetSim is creating a software to simulate various TCP/IP networks based on Ethernet, WiFi, PPP, etc...
A simple Java 5 library for printing human readable differences in time in multiple languages. Each class is responsible for printing a time difference in a certain language. Pure Java 5.0, no external libraries for maximum runtime speed.
The project consist in an open source implementation of the W3C Recommendation of the XML Key Management Specification 2.0 XKMS 2.0. It is compound of a XKMS Server and a Client API to access to the Server via Web Service.
Secure File Transfer for Windows with Cerberus by Redwood
Protect and share files over FTP/S, SFTP, HTTPS and SCP with the #1 rated Windows file transfer server.
Cerberus supports unlimited users and connections on a single IP, with built-in encryption, 2FA, and a browser-based web client — all deployable in under 15 minutes with a 25-day free trial.
The main goal of this project is the development of an IFX Transaction Switch that handle particular devices like an ATM (J/XFS compliant), POS in the future, and other devices that speak a common language: IFX
A lightweight, compact, stand-alone, platform-independent application to forward TCP (over IPv4 or IPv6) connections to another host. Possible uses include - but not limited to - firewall hacking, tunneling, proxying, fortifying ADSL, creating multi-plat
DIET-PC (DIskless Embedded Technology Personal Computer) is a software kitset enabling IT professionals to build an open source GUI appliance based on commodity x86 (PC), PowerPC (Mac) or ARM (handheld) hardware, using an embedded Linux methodology.
YES Linux a distribution that is focused on ease of use, user experience, and the internet. In 3 screens a secure server is installed and administered from a browser. A user should not have to use the console, but can if they wish.
Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Fsgrep is a simple Java application which allows a user to
search all files in a directory structure for lines matching
a given pattern. Its functionality is a combination of the
Unix find and grep utilities.
An easy-to-use generator for large numbers of passwords.
Originally for my school's IT Department, I have now released the source code under the GNU GPL. It supports the random generation of huge numbers of passwords that can be determined in a variety of ways.
JSysmon is a Java library providing access to system information like CPU or Memory usage on various platforms using native calls. It can be used to build cross-platform monitors in your applications.
This project consists of a proxy application that supports SMTP and POP3 and archives those emails in rfc 822 format. It does not include any archive but uses existing archives through a plugin infrastructure.
Java Password Tracker. A cross-platform application to safely store away your passwords. The file format is compatible with the original password safe application.
abiquo platform allows to create intelligent distributed networks interconnecting all kind of devices. We ease the interaction between gadgets, users and organizations through empowering technologies which add intelligence to actual networks.
Government (Generic) Services Infrastructure (GSi) is a unified technology platform which empowers business processes to be modeled, deployed, executed and managed in an intuitive and efficient manner.
RemoteSocket Java API and implementation for local/remote infrastructure.
This API allow to create a client Socket and ServerSocket on remote machine and manipulate with such socket as it on local machine.
IPv6SubnetCalc is a comprehensive calculator for IPv6 addresses. It comes with Java Swing GUI and supports the following RFCs: RFC4291, RFC4193, RFC3849, RFC2464, RFC5375, RFC4941, RFC3513, RFC3879, RFC4941, RFC3056, RFC3587, RFC2374, RFC3306, RFC3956.
Archive files by date. Scans the folders, and archive them by dates. Features: 1. Simulation -- allows user to see what will happen before it commits 2. Progress bar -- a separate thread running a progress bar.
Communication program that allows one instance to act as a server and then any number of instances to connect through any desired port (specified by the server) to Chat and transfer Files, the server relaying. Chat history can also be saved.
Acelet-Scheduler with SuperScheduler and SuperWatchdog is a Java task scheduler with daemon and GUI for system and application job scheduling, can schedule tasks in a distributed environment. Holiday adjustable. Works out-box. See http://www.acelet.com
MD5 Rescue permite reparar archivos que se han corrompido si se dispone de como mínimo dos archivos corrompidos (corrompidos en diferentes partes) y se conoce el md5 del archivo correcto.