20 projects for "security" with 3 filters applied:

  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    Build gen AI apps with an all-in-one modern database: MongoDB Atlas

    MongoDB Atlas provides built-in vector search and a flexible document model so developers can build, scale, and run gen AI apps without stitching together multiple databases. From LLM integration to semantic search, Atlas simplifies your AI architecture—and it’s free to get started.
    Start Free
  • Simple, Secure Domain Registration Icon
    Simple, Secure Domain Registration

    Get your domain at wholesale price. Cloudflare offers simple, secure registration with no markups, plus free DNS, CDN, and SSL integration.

    Register or renew your domain and pay only what we pay. No markups, hidden fees, or surprise add-ons. Choose from over 400 TLDs (.com, .ai, .dev). Every domain is integrated with Cloudflare's industry-leading DNS, CDN, and free SSL to make your site faster and more secure. Simple, secure, at-cost domain registration.
    Sign up for free
  • 1

    turniket

    Registration passes at the turnstiles system

    system is designed to control staff access to production databases, as well as taking into account their passage of time.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    COAR-DMS

    COAR-DMS

    DMS for linux, C++ library, server, webUI , SOAP

    ...Library features: - storage management, free pages recycling - transaction log - indexing: full text, tags, metadata, document attributes - inverted index - versioning, collaboration - document trees, trees versionning - folders - plugins for auth (PAM,LDAP), db, file types plugins - tags - metadata (key value pairs) - object level security, folders documents ACL, - unix like security (rwx), special authorities - from thousands to tens of billions of documents - dashboard (working copies, new documents) - electronic signs - search statement, syntax like SQL - multithreaded, multiprocess library, Servers: - native HTTP server (libmicrohttp) - SOAP server - WebDAV(planed) - Indexer Python API WebUI GWT, JSP, SOAP-API
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    Effacor

    Protect sensitive data that has been deleted from recovery.

    When a file is deleted from a device the space for that file is merely de-allocated. In short: The DATA contained in that file still remains, and can be recovered. This can quickly become a security concern. There are various areas of business where this scenario is unacceptable: HIPAA Protected Medical Information, and Financial Data amongst them. Client Data must be protected from recovery in the event of theft. Blue-Pencil was created to fulfill that. "Blue-Pencil" protects sensitive data by "sanitizing" it - writing over it using special patterns designed to make data unrecoverable by traditional means before deletion thus keeping the data safe from prying eyes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    This is where web developers can get tools that can make their life easier. Web technologies and languages used contain but are not limited to HTML, XHTML, CSS, JavaScript, PHP, and AJAX. All code is extremely slim, fast running, and is W3C compliant.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 5
    The csvdatamix project aims to randomize CSV input data files in order to conceal the original state of the data. Similar to data masking or data transformation. Also has mapping abilities to translate back to the original state of the data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    ConDEnSE (Confidential Data Enabled Statistical Exploration) will be a web-based environment for statistical analysis of confidential data from various database sources, based on Plone and R, and using the Jackknife method of confidentiality protection.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    FLAG was designed to simplify the process of log file analysis and forensic investigations. FLAG facilitates efficient analysis of large quantities of data within an interactive environment. PyFlag is the reimplementation of FLAG in Python.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 8
    SME Server

    SME Server

    The Koozali SME Server is a simple and robust server gateway for SOHO

    The Koozali SME Server is the open source community side of the original e-smith server. SME Server consists of a modified Red Hat / CentOS Linux installation, together with a number of server applications as well as the server management web panel. Its strengths are its ease to use for anyone able to use a web interface, and its robustness, giving the ability to recover its initial state even after any upgrade. The server is designed for Small Offices and Home Offices to act as a...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    secureDATA is a simple and easy to use encrypted personal information manager. It can store both textual information (passwords, usernames, electronic receipts, etc), and (as of v1.6) files. It uses AES-128 encryption via the Python Cryptography Toolkit.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    The Free Digital Money project aims to promote ideas and stimulate further innovation in the field of digital money. It provides a e-money implementation that can be used by anyone to try out ideas, build sample applications, or for further development.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    OpenSessame is a personnel entry control and time tracking management system. Platform independent, multi-node, client-server system, written in Python, with wxPython/wxWidgets client, a web management gui and PostgreSQL database backend.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    CryptoHawk can calculate hashes (md2,md4,md5,sha-1,sha-256 and hmac). It can also perform cryptanalysis like frequency analysis for substutition cipher and exhaustive key search for rotation cipher, as well as searching internet databases for md5 hashes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    A complete server platform for business: web, database, portal, ecommerce, intranet, office, email, virtual office/VPN, security, groupware, CMS, CRM, workflow. Apache, LAMP, WAMP, J2EE, Zope, Webware,Perl,Python, jk2, portal kit, portlet, accounting/ERP
    Downloads: 4 This Week
    Last Update:
    See Project
  • 14
    PyGestPayCrypt is the Python implementation of GestPayCrypt and GestPayCryptHS classes for italian Banca Sella GestPay online credit card payment system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    SystemSpecifyer is used to develop and maintain complex, well structured, systems specifications, in normal language. Using the System Matrix double matrix relation building mechanism specs can be tested for completeness, correctness and consistency.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    ...Automatic Dialing-Announcing Device (ADAD)/phoning committee. Multiple mailboxes and dials the announcement to the list who need to hear it. For: BirthRight, CWL, dental appointments, PrayerChain, security alarms etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    GNotary is an asynchronous peer-to-peer digital notary service based on email. The server polls POP3 mail boxes scanning for specified key words in the subject line. A digital signature of the email body is returned to the sender.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Ice Coral - WorkLog

    Ice Coral - WorkLog

    Work diary to make an evidence of device servicing

    This is a part of the Ice Coral project. The WorkLog is focused on evidence of device servicing. It's good for service teams to share information about done work. For more information visit Ice Coral - WorkLog Web Site link below.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Ice Coral (project)

    Ice Coral (project)

    Information system for network infrastructure

    Ice Coral is intended to take place as Information System for InfraStructure (ISIS). This project should be central information evidence about your network infrastructure. It's planned as modular system, so you can use only one part of this system (eg. WorkLog), if you want. For more info visit Ice Coral (project) Web Site link below.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Ice Coral - TimeSpan

    Ice Coral - TimeSpan

    Scheduled task and device event evidence

    This is a part of the Ice Coral project. The TimeSpan is focused on event evidence, for example scheduled tasks (Windows Task Scheduler, crond). For more info visit Ice Coral - TimeSpan Web Site.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next