Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.
Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
Try Auth0 for Free
Try Google Cloud Risk-Free With $300 in Credit
No hidden charges. No surprise bills. Cancel anytime.
Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
A rule based packet and application filtering firewall. Nice interface, easy configuration and high efficiency with low resources consumption. THIS PROJECT IS NO LONGER UNDER DEVELOPMENT.
This project hosts a framework for lab automation based on COM. Generic interfaces for handling manufacturing and research automation are included. Drivers for hardware also included as developped; hardware appears as a COM object.
You are looking for to delete the cached password stored by CVSNT in the registry editor ??, This is your solution !!, this is a Registry Monitor designed for this, monitor a registry key and delete it after a configurable time.
It's nice to share, and that's what j:System is all about - sharing eye-candy between applications. Read (and see) more at http://www.k23productions.com/products/jsystem/
Sniper is a powerful keylogger component that can be easily integrated in applications. It is a small,easy-to-use ActiveX control that encapsulates all the complexity for logging keys and exposes a few important properties and methods.
Displays the online/offline status of up to 8 networked devices as reported by the ping command. [Works on Vista] Note - The password for the zip archive containing the source files is: pc
Generate interest, access liquidity without selling, and execute trades seamlessly. All in one platform.
Geographic restrictions, eligibility, and terms apply.
Connects to Active Directory and retrieves a list of computer objects, queries for FSMO roles, and then connects to computer objects and queries for inventory information, outputting results to .csv file.
InterStructures a Linux System Administration platform built using MMC familiar to systems administrators.It is a complete server administration platform integrating Linux and Windows servers and providing intuitive and easy point and click administratio
Use this software to split & merge any file at any size (from 1Byte) that user have to type in "Per splitting file size" combo-box in this format: <number><space><Byte/KB/MB/GB> example: 12 MB; 1 Byte ; 5 GB etc. [Visual Basic 6.0]
DFK: Duplicate File Killer will search a user specified directory/drive for duplicate files of any kind. It will eventually utilize image recognition for image comparison, audio matching algorhythms for sound file matching and CRC/MD5 hash testing.
Hex Editor VB is a hexadecimal editor for Windows. It allows to view and/or edit files, process memory and physical/logical disks. It includes lots of functions like file management, process management, advanced conversions between bases, disassembler...
Eschaton is a 'lite' comic archive management utility. Allows the user to generate and insert .NFO files, rename archive filenames, rename content filenames, and create new archives. Will support .ZIP/.CBZ, .RAR/.CBR and .7ZIP.
Cybera is an Internet cafe administration system. It works with prepaid cards or client accounts or in a post paid Self Service mode. Features include workstation control, user rights lockdown, accounting, stats and screen replication for CAI.
The goal of this project is to create a program that will manage the timers in an Insteon Powerline Controller(PLC) without having to use the Insteon SDK. More info is at www.efundies.com.
Easy and ready-to-use set of .Net Classes to implement LDAP applications (Servers and Clients).
Included in the project:
- Classes for all types of LDAP Requests and Responses;
- Void Server and void Client Classes, ready for custom implementations.
The purpose of this application is to watch running processes while surfing suspicious sites. This will help identify new undocumented viruses, malware and or exploit that is currently in the wild.
Multihop ad hoc networks rely on auto configuration in most of the system's building blocks. The goal of this project is to generate easy to install and use packages for multihop ad hoc network auto configuration tasks.
v00d00-CD-Key will display the MS Windows License key, Windows version and build, Registered Owner, Registered Organization, as well as any Windows XP Office license keys, and some Office 2003 license keys. This is a single executable, nothing to install