Access competitive interest rates on your digital assets.
Generate interest, borrow against your crypto, and trade a range of cryptocurrencies — all in one platform.
Geographic restrictions, eligibility, and terms apply.
Get started with Nexo.
$300 in Free Credit Towards Top Cloud Services
Build VMs, containers, AI, databases, storage—all in one place.
Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
Replicates POSIX user credentials over the Internet - NIS replacement
...It is like NIS, but it:
* Is really easy to use -- it practically works out of the box;
* Works over the Internet -- it is compatible with regular firewalls; and,
* Uses SSH to encrypt the data-flow
It relies upon GNU nsswitch.conf (in glibc) for integration.
GNU GPL 3 licensed.
Web reverse proxy for Single Sign On (SSO). It can apply a security policy (profiles stored in a LDAP directory) to an existing set of applications, consolidate websites, encrypt all communications, rewrite simple URLs...
This project is a Linux-PAM module designed for mounting a user's encrypted,
home directory using the user's login credentials as the decryption key. The
module also unmounts the user's home directory at logout to re-encrypt the protected data.
MailRemote is a script which will allow you to administrate remote hosts via email through eg. procmail. Commands and files are executed in a shell environment. It will handle MIME messages and verify the messages which have to be encrypt and signed.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.