Stop Cyber Threats with VM-Series Next-Gen Firewall on Azure
Native application identity and user-based security for your Azure cloud
Gain integrated visibility across all traffic in a single pass. Deploy Palo Alto Networks VM-Series to determine application identity and content while automating security policy updates via rich APIs.
Get a free trial
Stop Storing Third-Party Tokens in Your Database
Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.
Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
Emulator of the ancient 8 bit microprocessor SC/MP 2
...You may slow down the CPU operations, displaying the CPUs status register as LEDs, to watch the CPU working with its registers.
The emulator also contains a VDU (video display unit) output / ASCII input simulation. There are some demos in /etc. And have a look to the NIBL / TINY BASIC interpreter in the TINYBASIC folder, most of the code is over 40 years old.
Have fun,
Theo Heinrichs
This project is a simulation of an electromechanical computer based upon the design presented in Charles Petzold's book "CODE: The Hidden Language of Computer Hardware and Software"
An Interactive Fiction Player written for Java Virtual Machine. It implements the Z-machine and Glulx specifications and can be used either standalone or as an applet. The Z-Code/Glulx interpreter runs adventures made by Infocom and contemporary Inte