With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Automate contact and company data extraction
Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.
Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
SSH Java client GUI for Unix, Linux administration and monitoring
...Access your servers; this release is integrated with the following 3rd party tools: Remote Desktop (RDP), PuTTY(included) , WinSCP (included) and Wireshark (separate download).
Bandwidth and system monitoring.
Secure login
csv fields encryption
MS Windows XP/Vista/7
Linux Red Hat, SUSE, Ubuntu (Debian)
[Raanan Zion]
SSVNC adds encryption security to VNC. It provides a GUI for Windows, MacOSX, and Unix that automatically starts up an SSL or SSH tunnel for connections to any VNC server. It also supports VeNCrypt encryption. The Unix viewer has many new features.
superseded by SgpDec http://sgpdec.sf.net Java implementation of the holonomy algorithm for the algebraic hierarchical decomposition of finite state automata.
A repository of grid computing student exercises. The repository currently contains a grid-enabled mergesort using Condor. Exercises to be developed include genome analysis, genetic algorithm, integration, matrix multiply, ray tracing, etc.
Secure and customizable compute service that lets you create and run virtual machines.
Computing infrastructure in predefined or custom machine sizes to accelerate your cloud transformation. General purpose (E2, N1, N2, N2D) machines provide a good balance of price and performance. Compute optimized (C2) machines offer high-end vCPU performance for compute-intensive workloads. Memory optimized (M2) machines offer the highest memory and are great for in-memory databases. Accelerator optimized (A2) machines are based on the A100 GPU, for very demanding applications.