Your top-rated shield against malware and online scams | Avast Free Antivirus
Browse and email in peace, supported by clever AI
Our antivirus software scans for security and performance issues and helps you to fix them instantly. It also protects you in real time by analyzing unknown files before they reach your desktop PC or laptop — all for free.
Free Download
Our Free Plans just got better! | Auth0
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
This is a apache v2.0 authentication module. Based on html form authentication and cookie authentication session. Cookie session are stored in memcache deamon. Can be used has an simple "Single Signe-On" (SSO).
All the codesource and the bug tracking has migrated to github:
https://github.com/ZenProjects/Apache-Authmemcookie-Module
All the documentation are here:
https://zenprojects.github.io/Apache-Authmemcookie-Module/
Forensic scripts for evidence acquisitions, analysis and more
This project contains various scripts and code snippets that can easily be deployed by an incident responder or forensic analyst to aid them in either acquiring or analyzing critical data.
You can contact me at: interrupt08@users.sf.net or visit my blog, fork(), at https://forksec.wordpress.com/
BASE is the Basic Analysis and Security Engine. It is based on the code from the Analysis Console for Intrusion Databases (ACID) project. This application provides a web front-end to query and analyze the alerts coming from a SNORT IDS system.
Project Naranja will uses Padlock Security of VIA EPIA mini-ITX motherboards in order to provide a toolkit to set up and use encrypted filesystems with Linux. NOTE: Files are now hosted at Google Code: http://code.google.com/p/naranja/
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Set of tools and libs for
managing structured data
in a very flexible way:
Imp./Exp. ASCII, XML, SQL,
PS, Tex/LaTex, RTF
GUI: X-Windows, MS-Windows
Interface to C++, DBs, Perl,
PHP, Java, TCP/IP
LISP-like interpreter
written in C++ using C-LIB
This SF project provides all the necessary sourcecode to create and update a non-representative democracy, i.e. an isocracy.
This is the software part of the melting-vote project.