Jscrambler offers an exclusive blend of cutting-edge first-party JavaScript obfuscation and state-of-the-art third-party tag protection.
Jscrambler is the leader in Client-Side Protection and Compliance. We were the first to merge advanced polymorphic JavaScript obfuscation with fine-grained third-party tag protection in a unified Client-Side Protection and Compliance Platform. Our integrated solution ensures a robust defense against current and emerging client-side cyber threats, data leaks, and IP theft, empowering software development and digital teams to innovate securely. With Jscrambler, businesses adopt a unified, future-proof client-side security policy all while achieving compliance with emerging security standards including PCI DSS v4.0. Trusted by digital leaders worldwide, Jscrambler gives businesses the freedom to innovate securely.
Learn More
Free Website Monitoring Service | UptimeRobot
The free online uptime monitoring service with an App is available for iOS and Android.
With the Free Plan, you can monitor up to 50 URLs, check for a website's content (using the keyword monitor), ping your server or monitor your ports in 5-minute intervals. You can create a status page to showcase your uptime. SMS or Call alerts can be bought anytime.
KNN-WEKA provides a implementation of the K-nearest neighbour algorithm for Weka. Weka is a collection of machine learning algorithms for data mining tasks. For more information on Weka, see http://www.cs.waikato.ac.nz/ml/weka/.
Luky Library is a set of java classes which abstract complex operations. It comprises of classes for networking, event handling, encryption, database handling, snmp monitoring, queues, semaphores, parsers, XML handlers and much more
This project intends to create an indexing search engine, for knowledge management. The primary object is to apply an information retrieval core. And implement a knowledge data discovery theory such as data mining algorithm, text mining.
Fax.Cloud delivers encrypted, point-to-point faxing with guaranteed delivery and built-in audit trails
For organizations in regulated industries needing a solution to replace traditional fax infrastructure and integrate with email or online portals
Unlike email or file-sharing tools, Fax.Cloud doesn’t bounce around the internet, exposed and vulnerable. It’s direct, encrypted, and verified. You get delivery confirmation, audit trails, and peace of mind, without the spam filters, metadata leaks, or cyber threats.
A Java implementation of the NEAT algorithm as created by Kenneth O Stanley. Also provides a toolkit for further experiments to be created and can provide both local and distributed learning environments.
StrMatch is a simple java program, created for educational purposes, that allows user to test a great part of string matching algorithms.
An intuitive user interface shows each algorithm step accurately...
musicomp is a program which most important element is an evolutionary algorithm which uses data mining methods as a fitness function to generate monophone melodies.
Galapagos is a Genetic Algorithm framework written in Java 5 with the intended audience of undergraduates in an Artificial Intelligence class. The goal of Galapagos is usability: a competent student should be able to learn this library in an afternoon.
Flash/PHP adaptation of the XTEA encryptionalgorithm. Allows encryption/decryption of sensitive data using 128-bit key. May be used for network data (HTTP) or offline for implementations like secure CD-ROM projects.
Streamline your business with an all-in-one platform for HR, IT, payroll, and spend management.
Effortlessly manage the entire employee lifecycle, from hiring to benefits administration. Automate HR tasks, ensure compliance, and streamline approvals. Simplify IT with device management, software access, and compliance monitoring, all from one dashboard. Enjoy timely payroll, real-time financial visibility, and dynamic spend policies. Rippling empowers your business to save time, reduce costs, and enhance efficiency, allowing you to focus on growth. Experience the power of unified management with Rippling today.
PRE4J (Partial RDF Encryption API for Jena) is a lightweight API for encrypting selected RDF graph elements. PRE4J provides cryptographic extensions to the Jena Semantic Web Framework.
Prowser is a "programmatic browser" library for Java. It enables programs to surf the web via an API that mimics the way a human user operates a tabbed GUI browser. Features include: form submission, downloads, authentication, and encryption (https).
distDES is a Java RMI-based application which manages load balancing on heterogeneous clusters. Development will extend the theoretical initial implementation to include clustered Rainbow Table generation and encryptionalgorithm collision detection.
NAC is a collection of tools for cryptography. The goal is to provide simple-to-use crypto tools (like an OTP, String and number generator, public key algorithm...) you can use under Linux, Windows...
Common utility methods, classes and algorithm library for general use. Although this library focuses on common utility algorithms, main goal of this library is ease of use by trading some flexibility.
Butterfly XML Editor is an IDE built on top of a new real-time incremental XML parsing algorithm. The editor features syntax and error highlighting, incremental validation, code completion, XSLT pipelines, and side by side DOM and source viewing.
This project provides an interface to Sun's JCE (Java Cryptographic Extensions) as a JSP taglib. It brings strong encryption algorithms such as AES and Blowfish to your JSP applications. It uses the bouncycastle.org cleanroom JCE 1.2.1 implementation as
JLibDiff is an implementation of diff and diff3
algorithm as lib. Differences are represented as
java objects. You can use this lib for building text diff tools for example
jui is a tool for creating Java GUI layout components. It has a powerful but simple layout algorithm and support for the Swing look and feel guidelines.
A similar to Tripwire, file system integrity checking tool but develop in java and cross platform.
This tools checking and source control using check sum algorithm like MD5, SHA and CRC.
This project comprises a collection of libraries and applications for the field of program analysis. The starting point is a type analysis for Java programs using Agesen's Cartesian Product Algorithm.
A collection of implementations of the Lovins stemmer as described in "Development of a Stemming Algorithm" by Julie Beth Lovins (published in "Mechanical translation and computational linguistics", 11:22-31, 1968).
Java/GWT based Web Application dubbed InSitu. In essence, a user Interface for interaction with Collaborative Staging algorithm. Distributed as standalone web-app and can be integrated into any web based application or used independently.