With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
$300 in Free Credit Towards Top Cloud Services
Build VMs, containers, AI, databases, storage—all in one place.
Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
POLUS, a software maintenance tool capable of iteratively evolving running software into new versions, aims to retain backward binary compatibility, support for multithread software and recover already tainted state of running software with low overhead.
Lets you uninstall DirectX 1.x - 8.x including bogus or beta installations from your computer and than re-install a current or an earlier versions. Use with caution!
Management of users, tables and views for an oracle database behind active directory. Management of users, groups and computer for an Active Directory shema. Management of external users trough Active Directory for Oracle
SCSI means Simple C# Interpret which allows you to interpret your C#(Visual Basic.Net in a future) sourcecode. Sourcecode could be also stored in special XML file(documentation included). Supports GUI applications.
Having trouble with DST2007? This utility is able to update daylight savings time information on multiple computers at once. You can set it for the computer you are running it on, a single remote computer, a list of remote computers, or an IP range.
JAccessBoss is a great access management and time control utility that allows you to restrict the time when the specified group of users is allowed to log on and use a local or network computer.
A port of Webmin's weblib.pl to help writing php webmin modules. The phplib html template class is also included to have a true separation between code and html.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Code and documentation to replicate a sample web-based registration form (online or off-line) and build a database of participants, including password protection, password reset request via email, several reports, directory download, and other features.
Cybera is an Internet cafe administration system. It works with prepaid cards or client accounts or in a post paid Self Service mode. Features include workstation control, user rights lockdown, accounting, stats and screen replication for CAI.
gives remote control of a PC running MS-DOS (which e.g. does not have a monitor display attached to it). The screen image (currently text mode only) is taken from the graphics card and transferred to other computer via serial link and displayed there
VeNCrypt adds TLS/X509 encryption and authentication to VNC. It is heavily based on the RealVNC Free Edition, thus being a single fork away from the original creators of VNC, and is fully compliant with the RFB protocol.
This is a VNC Viewer for Symbian 3rd Edition. It allows a smartphone to estabish a TCP/IP connection with any remote computer running a standard VNC server and control it from the phone without the need of any other software
iCMS is a web based control and monitor application that allows for the remote control and monitoring of (computer) systems. It is supports icmp and snmp polling, mibs, recovery, distributed deployment, high performance multithreading, logging in levels
Secwatch is an intrusion detection system using log analysis to detect service scan and other brute-force attempts on a server or other computer using system logs and will create temporary firewall rules to block offending IPs
timecd (time control daemon) is a daemon to control the time a user (child) may use a computer. When the time is used up, an arbitrary command is executed. The time for a day, a week and a month may be defined seperately.
Ramdisk Rescue allows Embedded Linux to be installed to a flash card (SD, MMC or CF) using a handheld, without requiring a separate computer to format the card.
A tool for generating objects that allow easy mapping from java to jndi/ldap data storage and integration of different data sources in a transparent data access layer.
CACM = Client Access to Cluster Manager manage access via ssh for user to a cluster (or a computer) via SSH key and a Web calendar Interface. The web site manage all users. An user can reserve the cluster via the web site. A daemon generate a SSH-key-p.
Murdoc is a system for presenting documents in webpages.
Murdoc includes a lot of tools to create documents, including tools to automatically document a variety of computer systems.
The universal program of a computer management. Allows to connect some events in system (approach of specified time, start/end of other programs, pressing of a combination of keys...) with some actions (shutdown, reboot, start/end of programs, etc.).
Moving to google code: http://yaci.googlecode.com Yet Another Cluster Installer) is a lightweight system tool used to reliably and quickly install large-scale (and small-scale) Linux clusters. It supports RedHat 7.3, 9 for i686, and RHEL3 and R