Showing 2 open source projects for "network security"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Automate contact and company data extraction Icon
    Automate contact and company data extraction

    Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.

    Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
    Explore Apify Store
  • 1
    USSU Unlimited

    USSU Unlimited

    Unattended System Software Updater Unlimited

    USSU Unlimited helps you to manage and keep your standard Windows applications up-to-date. It gives the possibility to add applications yourself. Use it to upgrade already installed applications, it highlights outdated or missing applications and advises to download and install them in a single step. It takes away those frustrations to update everything manually. Instead it leafs your with a updated computer and a smile! Currently 45 standard applications are supported. more supported...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    CVS nserver is the almost complete rewrite of network-related CVS code. It features improved security, support for virtual repositories with fully remote management of users, additional authentication methods such as PAM. ACL (access control lists) and
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next