Access competitive interest rates on your digital assets.
Generate interest, borrow against your crypto, and trade a range of cryptocurrencies — all in one platform.
Geographic restrictions, eligibility, and terms apply.
Get started with Nexo.
Earn up to 15% annual interest with Nexo.
Let your crypto work for you
Put idle assets to work with competitive interest rates, borrow without selling, and trade with precision. All in one platform.
Geographic restrictions, eligibility, and terms apply.
With this system, a person can ask a yes/no-question to group of people while their answer is kept completely anonymous. The project is based on the dining cryptographers protocol.
Secure Storage service is a set of tools to store in a secure way and in an encrypted format confidential data on the grid storage elements. The service has been designed for the grid Middleware of the EGEE infrastructure, gLite.
A Steganographic Tool that lets u hide any file into any file. It is based on Image, Audio, Video Steganography that hides any file or message into an image(BMP,JPG,GIF), Audio/Video(MPG, WAV, etc) or any other file format(PDF,EXE,CHM etc..)
ToolME provides J2ME mobile application developers with a set of API utilities (tools) that aim to solve many of the common problems a J2ME developer will face when developing mobile software.
Streamline proposal creation with the smartest AI, the best content, seamless integration with Microsoft Word, and unmatched efficiency.
Automate your best practices, processes, and standards to guide your proposal writers, sales teams, and subject experts. And don’t worry, it’s so easy to use they will use it. We would love the opportunity to help you quantify the impact your business can expect from investing in Expedience Software. Click here to request a Return on Investment (ROI) calculation. In this 15-minute session, we will ask 20 simple questions to assess and grade your current proposal quality and scalability. Manual proposal processes are likely costing you far more than you realize. These models waste time and kill the productivity of proposal writers, sales team members, senior staff, and subject experts.
TEF is a fully-featured, secure and has advanced capabilities including the intuitive Xsentry easy-to-use administration graphical user interface with WYSIWYG (What You See Is What You Get) front end which has drag and drop security policy deployment.
NetBeans, pure Java. The Cryppie can protect your files by encrypting its content, possibility to compress files before encryption. It's destination for keep information in safe on your flash drive or another storage.
Penny Post is a system to combat spam emails by making the sender "pay for email" by spending a few seconds of computing time. Outgoing mail is marked with postage stamps that convince the receiver that the sender is genuine.
This is a demonstration of integrating the CAPTCHA service from http://recaptcha.org with Oracle Single-Sign-On. It can be used in production OSSO deployments, and also as an example of integrating any 3rd party authentication system with OSSO.
Jesta I.S. | Enterprise Software For Retail and Supply Chain
Transition from fragmented entry-level or legacy systems to an enterprise suite.
Unify your people and operations across all departments and channels. Discover end-to-end retail, wholesale, and supply chain management software suites designed to scale.
Open Legacy Storage Document: Generic Document Archiving on Disk and Network(using MINA) Framework in Java for huge number of docs(up to 2^192 documents), efficient(Java NIO), crypto, net transfert, web retrieve, J2EE and eMail archiving compatible.
JavaLightServer is a multi-purpose server that can be used to share our desktop across the Internet with other authorized clients. It provides also a secure connection using SSL certificates.
Grimoire Encoder is a useful Ascii Encoder while doing penetration tests on web applications. It supports URL Encoding, Full URL Encoding, Double URL Encoding, Unicode HTML, Unicode URL, Unicode URL IE Specific, Base64 Encoding, MD5, MD2, SHA1 and Binary
This is a fork of the JSch project (Java Secure Channel) which fixes bug 1849771 (infinite loop when password is incorrect). It is hoped that the JSch author will incorporate this fix into the official JSch project.
Magstripper is a magnetic card reader and decoder that takes raw waveform information from a magnetic audio head (soldered directly to a mono audio jack) and processes it via a mic input. It also includes a multi-user door lock access control system.
JSummer is a tool to compute and check MD5, MD4, MD2, SHA-160, SHA-256, SHA-384, SHA-512, RIPEMD128, RIPEMD160, WHIRLPOOL, TIGER, HAVAL message digest consisting of a Console-Version and GUI. Implemented in Java.
The Secure Java Code Filter (SJCF) provides an ICAP-based filter mechanism for mobile Java code and the signatures applied to it. Administrators can define a centralized policy determining which applications and signatures respectively are allowed.
iDate searches via Bluetooth if there are potentially nice dates in your vicinity. You will be notified who is in your vicinity has iDate and whether these people could be a nice date if for each the profile matches the search profile of the other.
Legalfinger is a bunch of Java-based software including a set of portable software installed inside an USB finger to protect any digital content copied onto the USB finger.
Maymuncuk, ensures to save your passwords.It contains four different functions to save your different type passwords.They're Membership,E-Mail,FTP and other types. Maymuncuk, has multiuser support.