Build gen AI apps with an all-in-one modern database: MongoDB Atlas
MongoDB Atlas provides built-in vector search and a flexible document model so developers can build, scale, and run gen AI apps without stitching together multiple databases. From LLM integration to semantic search, Atlas simplifies your AI architecture—and it’s free to get started.
Start Free
Simple, Secure Domain Registration
Get your domain at wholesale price. Cloudflare offers simple, secure registration with no markups, plus free DNS, CDN, and SSL integration.
Register or renew your domain and pay only what we pay. No markups, hidden fees, or surprise add-ons. Choose from over 400 TLDs (.com, .ai, .dev). Every domain is integrated with Cloudflare's industry-leading DNS, CDN, and free SSL to make your site faster and more secure. Simple, secure, at-cost domain registration.
The FreePKI project aims to create practical, interoperable & free code and services for Certificate and Registration Authorities based on the X.509 standard, including nearly zero-cost ID verification through a PGP-like web of trust scoring system.
JODI, the Jointly Owned Digital Imaging specification, documents the requirements and behavior of a proposed Point-of-Sale (POS) anti-fraud effort. JODI is a specification for hardware, software, procedures, and a legal framework that prevent fraud.
Stream Shield is a program to encrypt and anonymize your connection to the internet by connecting to remote proxies, using Blowfish/Rijndael Algorithms and removing many personally identifiable headers such as referer, user-agent and more.
Overcoat encrypts your projects exe file before distribution (for shareware authors for example), that limits the use of an exe file, and forces the user to purchase/registar after a certain developer defined period
ObscureEncrypt is a high level security encrypter. It encrypts at three levels, 448 bit Blowfish encryption, Obscurity, high level encryption. Making it almost impossible to decrypt
It's hard remembering good passwords. Most people pick a one or two passwords and use them all over the place, which is a really bad idea, and we all feel bad about doing it. I got sick of feeling like this, so I wrote PWM to manage passwords for me. I f
ThorsenCode is a client-server system, that allows you and your buddies to share files in a safe way. It features encrypted filetransfers and encrypted chatrooms.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Another open sourced crypto library. Unlike Crypto++ and cryptix, we're language independent. We originate in 'C', add wrappers for C++ and Objective-C. When that works, we provide a JNI wrapper for Java. Following this, we seek out Python,
RSA-IP is a Linux kernel net _protocol_ which encrypts IPv[4;6] using RSA public/private key.Think of it as a kernel level implementation of ssl. RSA needs prime number so we release a prime searcher.
A fast and flexible implementation of SSH and SCP for Java, modelled on OpenSSH. In the beginning it should be simple, but hopefully eventually feature-rich.
E-Dot (which means Encryption and Decryption Of Texts) is a very small tool for encrypting textfiles. E-Dot doesn't use Keyfiles: A password is enough. This tool is available for Linux and Windows, too.
CryptographyTool,analyzes relatively easy cryptograms
for getting into the material
The easy cryptograms are mostly any kind of an substitution
cipher(mono or polyalphabetic)
So the program gives you a few tools with which you can
analyse and edit t
Yavipind is a secure tunnel aka 2 peers securely forwarding
packets toward each other.It is what most people calls a VPN (virtual private
network).
It forwards any kind ofpacket (IPv4, IPv6 or other) sent over the virtual
network interface (e.g. t
The LTC Encryption program is designed to implement the cryptographic functions contained in the libtomcrypt.a library. It works similar to PGP, but does not use the OpenPGP standards.
A library implementing the AES (American Encryption Standard) or Rijndael algorithms, intended to provide a neat packaged solution
for other projects to use.
Package includes C and Intel Pentium/MMX assembler versions
of AES, along with an extensive
In DeCrypto you will find a collection of scripts for helping decrypt messages. Eventully I am going to put these scripts together into a nice interface.
The Ada Cryptographic Framework (ACF) is a set of Ada packages that implement the most popular cryptographic algorithms. The main goal of the proyect is to implement a complete set of cryptographic primitives entirely in Ada 95
Hyperfile provides an easy-to-use and flexible interface to power and maintain highly dynamic user-defined data sources. The data sources are stored using a secure and reliable encryption algorithm.