Open-source
Backup your Android and iPhone photos and videos with Immich
Self-hosted photo and video backup solution directly from your mobile phone.
Open-source
Self-hosted photo and video backup solution directly from your mobile phone.
security
What is a password manager? A password manager program is software that helps you keep and organize your password securely and privately. It is an essential tool for active internet users who value their security. What does the password manager do? The primary function of a password manager is as
List
Privacy and security are not luxury elements, They are your right. Secure messaging and communication channels are daily requirements for all users. In this article, we will help you choose the right open-source, and free secure messengers. Our selection focuses on apps with end-to-end encryption (E2EE). Some of them have
Password Manager
What is the KeeWeb app? KeeWeb is a free, open-source password manager for the desktop and the web. It is originally built by Antelle, a full-stack software developer from the Netherlands. KeeWeb is fully packed with useful features which makes it favorable by many active internet users. Beyond its desktop
security
What are Cyber threats? A cyber threat is any event with the potential to harm any information system, disclose or leak private information, or denial a service for its intended users. Types of cyber threats? 1. DoS attacks: "Denial of Service" 2. DDoS attacks: Distributed denial of service
List
Why do you need a password manager? If you are an active internet user, then you have dozens of accounts with different passwords on many web services. Therefore, you will need to a password manager to keep your passwords and authentication private information in a secure place. The password manager
Open-source
What is a password manager? A password manager app is a program that saves and records all of your passwords in one locked secure vault with one master password. There are several paid and commercial password managers for macOS, therefore, we compiled this list of open-source, free alternatives. Open-source Password
Password Manager
What is LessPass? LessPass is a free, web-based password manager for individuals. The project is maintained by a large community of developers and software engineers. LessPass uses PBKDF2 with 100,000 iterations and a hash function sha-256. Password generation is based on pure functions. Features 1. The project is released
privacy
What is KeePass? KeePass is considered the most popular open-source password manager, and not just among end-users, but also among developers who ported it to all known platforms. KeePass helps users to manage their passwords securely and privately, without having to worry about many technical details. It supports several encryption
Open-source
What is Padloc? Padloc is a dead-simple password manager app for users who want to get the job done without any distractions and clutter. Padloc is a free, open-source solution but also offers a web service that helps the user to sync and store their passwords and keys in an
Password Manager
What is Buttercup? Buttercup is a lightweight password manager for desktop and mobile. It comes with a strong 256bit AES encrypted vault that keeps your passwords and credentials secure and safe. Buttercup is a completely free, open-source solution which means you can download and use it without worrying about lock-in
Open-source
What is AuthPass? AuthPass is a multi-platform, free, and open-source password manager for all types of users. AuthPass is fully compatible with the popular open-source KeePass password manager, which many consider the father of open-source password managers. The app is written with Flutter which is gaining popularity among developers building
Enterprise
Single Sign-On (SSO) is a login service layer that allows users to sign in to multiple apps with a single login. Using SSO service to improve security, save the user from having to deal with multiple passwords, login sessions, and losing time. In contrast, SSO "Single-Sign-On" is an
Android
An email client app is responsible for accessing your email messages on the server from your device. Mail clients are available for desktop, or can even come in a self-hosted web-based form, which the user can install and use on their own servers local or remote. We have covered self-hosted
privacy
While the aim is to hide identities and protect us, free proxies come with a certain amount of risk. Free proxies sometimes end up doing the exact opposite of what we set them up to do. Proxies mask the original IP address so that web servers do not know the
Guide
كوالدين فاننا نفعل كل ما بوسعنا لابقاء اطفالنا امنين وسالمين, سواء من جعلهم ينزلقون على الزلاجة الى قطعهم للطريق, لكن ماذا تفعلوا عندما يتعرض ابنكم للتنمر او للمحتويات المفترسة على شبكة الانترنت. لنواجه ذلك اعداد المراهقين الذين يمتلكون الهواتف المحمولة في تزايد كبير, هذا الوقت مهم جدا لكل الاباء لوضع
security
SuperTokens: Agnostic Self-hosted Open-source User Auth with a lighting speed implementation with full Docker support
security
Single Sign-on (SSO), is a technology that combines several app login screens into one single login. In contrast, it offers a session and user authentication service for a user to use a single login for many apps. Let us take Google as an example, soon as login into your Google
security
CCTV or closed-circuit television system makes use of camera networks and monitor to watch and monitor of interior and exterior of a property. Companies, museums, art galleries, and houses are using CCTV networks for video surveillance and security. There are dozens of commercial CCTV software packages.However, as they vary
security
Briar is an open-source mobile massager application with enhanced security for Android systems. It is designed to protect its users from surveillance and authority tracking. With Briar, you don't need to worry about messages encryption as it uses a peer-to-peer encryption for all messages and forums. The app
web development
SSH Protocol, thinks about protocol as rules of transferring encoded data over the network. It is best used for accessing the remote servers when you use this SSH key, and you will get the command-line interface of the server. SSH stands for Secure Shell, is commonly implemented using the client-server
Development
Every person who is responsible for a website has the same nightmare. A hacker gets in and gains access to data or information that your employees or clients entrust you to protect. This can have massive consequences for an organization. It can have devastating PR effects, tank sales, cause downtime,
Articles
According to a recent study conducted by Pew Research Center, over 64% of Americans have experienced some data breach in the past. Unfortunately, several hackers on the internet are waiting for the slightest opportunity to take advantage of your data online. Therefore, it is essential to understand the kind of
Open-source
If you're just starting off in IT security, you may be wondering, where do you even begin with the process of securing an organization's data. There are frameworks available that can provide you with some of this information. One of the challenges with this is that