Results for: tor java

Suggested Categories:

Java CMS Software
Java CMS software, built on Java programming language and having multiple tools and features, is used by enterprises as a content management platform.
JavaScript Libraries
JavaScript libraries are collections of pre-written JavaScript code that developers can use to simplify and accelerate web development tasks. They provide ready-made functions, utilities, and components for handling common challenges such as DOM manipulation, animations, event handling, data formatting, and AJAX requests. By using libraries, developers reduce the amount of repetitive coding needed and ensure greater cross-browser compatibility. Many JavaScript libraries focus on specific areas, such as UI design, data visualization, or state management, making them versatile tools in both front-end and back-end development. They play a vital role in modern web applications by boosting efficiency, improving code quality, and supporting rapid prototyping.
JavaScript Obfuscators Software
JavaScript obfuscators are tools that transform human-readable JavaScript code into a form that is difficult to understand, reverse-engineer, or tamper with. They typically replace variable names, functions, and control structures with complex or meaningless patterns while preserving the code’s original functionality. Some obfuscators also add layers of protection like string encryption, dead code insertion, and control flow flattening to further complicate analysis.
Build Automation Tools
Build automation tools are software tools that automate the process of compiling, testing, and deploying software applications. These tools help developers streamline the building of software from source code, ensuring that the process is repeatable, consistent, and efficient. Build automation typically includes compiling code, running unit tests, generating reports, packaging software, and deploying it to different environments. By automating these steps, build automation tools reduce human errors, improve efficiency, and support continuous integration and continuous delivery (CI/CD) practices.
Code Review Tools
Code review tools are software tools designed to examine and analyze source code for errors, bugs, and vulnerabilities. They provide developers with detailed feedback on their code, highlighting areas that need improvement or optimization. These tools use a variety of techniques such as static analysis, unit testing, and peer review to ensure the quality and functionality of the code. In addition to identifying coding issues, they also help improve code security by detecting potential vulnerabilities or weaknesses in the code. Code review tools are an essential part of the development process for any software project.
Load Testing Tools
Load testing tools are used to test and verify the quality and performance of an application under workload in order to get rid of problems.

1241 Products for "tor java" with 1 filter applied:

  • 1
    Java

    Java

    Oracle

    The Java™ Programming Language is a general-purpose, concurrent, strongly typed, class-based object-oriented language. It is normally compiled to the bytecode instruction set and binary format defined in the Java Virtual Machine Specification. In the Java programming language, all source code is first written in plain text files ending with the .java extension.
    Starting Price: Free
  • 2
    Tor Browser

    Tor Browser

    The Tor Project

    Protect yourself against tracking, surveillance, and censorship. f you are in a country where Tor is blocked, you can configure Tor to connect to a bridge during the setup process. Select "Tor is censored in my country." If Tor is not censored, one of the most common reasons Tor won't connect is an incorrect system clock. Please make sure it's set correctly. Tor Browser will block browser plugins such as Flash, RealPlayer, QuickTime, and others: they can be manipulated into revealing your IP address. ...
  • 3
    TorRefresher

    TorRefresher

    Assist AI, Inc.

    TorRefresher is a lightweight Windows tray application designed to make using Tor simple and efficient. Built to work with the official Tor Expert Bundle, it gives you full control over your Tor connection without needing to touch the command line. 🔄 Automatic IP Rotation – Refresh your Tor circuit on a timer of your choice 🖱 One-Click Manual Refresh – Instantly change your IP from the tray 🌍 Exit Node Info – See your current IP and country at a glance 🔒 Bridge Mode Support – Works in censored regions with custom bridges ⚡ Fast & Lightweight – Runs silently in the background Setup is simple: download the Tor Expert Bundle, point TorRefresher to your tor.exe, and you’re ready to go. ...
    Starting Price: $15.99
  • 4
    TorGuard

    TorGuard

    TorGuard VPN

    ...Don't risk your personal privacy! Install TorGuard VPN service within minutes on any device. TorGuard software is pre-configured to protect your data with 256-bit AES encryption, DNS/IPV6/WebRTC leak blocking, kill switch, and more. TorGuard offers a massive network of 3000+ global VPN servers in over 50+ countries. Get unlimited bandwidth and zero throttling anywhere in the world.
    Starting Price: $9.99 per month
  • 5
    TORS Travel
    The TORS.Travel Back Office enables Tour Operators to cost and book bespoke/tailor-made/dynamically packaged itineraries. The design builds on the creation and use of a variety of travel reservation systems over many years. This system is in production use today. Price an itinerary in real-time while talking to your customer or as the customer views your website.
    Starting Price: $275 per month
  • 6
    Cloaken URL Unshortener
    Quickly expand shortened URLs and obtain a rasterized image of the website. By leveraging the power of TOR exit nodes you maintain anonymity. Cloaken URL Unshortener leverages the power of TOR to unshorten URLs which have been shortened using services such as Bit.ly or TinyUrl all while maintaining operational security. Operational security is maintained through the power of the TOR networks anonymity characteristics. Cloaken allows for a self contained and self managed URL unshortener service to be deployed within the AWS Cloud. ...
    Starting Price: $0.05 per hour
  • 7
    Maxim

    Maxim

    TOR Systems

    TOR’s real-time integrated booking and ticketing system is known as “Maxim.” It supports museums, zoos, galleries, theme parks, castles, heritage sites and gardens by providing the very best in ticketing, membership, retail and catering and CRM functionality. Maxim’s core strengths are flexibility, stability, reliability, and speed and ease.
  • 8
    Onion Browser

    Onion Browser

    Onion Browser

    Encrypted traffic through the Tor network gives you the highest standard of security and privacy. No extra eyes see your activity, save your history or influence your browsing. Targeted ads are history. Tabs don’t hang around. They close when you’re done, so every search is new. Tor offers the highest standard of privacy. You are not linked to your browsing activity.
  • 9
    Anonymous Messenger

    Anonymous Messenger

    Anonymous Messenger

    A peer-to-peer private anonymous and secure messenger that works over Tor. It's also free and open source software which gives users the freedom of changing it and redistributing it under the terms of the GNU General Public License v3. Anonymous Messenger utilizes Tor for its anonymity network and data transport security using the onion v3 protocol and the ability to run onion services on any device and connect directly and anonymously without having to set up any servers, also it uses the signal protocol to encrypt all data before sending it over the Tor network directly to the intended receiver, which means we get two layers of end-to-end encryption without using any server or service. ...
    Starting Price: Free
  • 10
    Zeus

    Zeus

    Zeus

    The best way to take your Bitcoin/Lightning node on the go. Connect to your node over VPN or Tor, make payments with lightning or on-chain, manage your channels, and more. Send traditional Bitcoin payments on-chain or take advantage of Lightning and experience near-instant settlement. Zeus connects to your node remotely over a VPN connection or Tor so you can buy that beer even when you're on the other side of the globe. No need to wait till you get home to connect to a storefront or newly made acquaintance. ...
  • 11
    PrizmDoc for Java
    Take your viewing to the next level with Accusoft’s PrizmDoc® for Java—a powerful document viewer with support for all popular document and image types. The HTML5 document viewer streamlines your processes with robust functionality, including annotation, redaction, split & merge, and so much more.
  • 12
    Conholdate.Total for Java
    Conholdate.Total for Java includes all file format Java APIs as a single suite that are offered by Aspose & GroupDocs. It enables software developers to build an incredibly versatile file processing system capable of handling many popular file formats and performs a wide range of document handling operations from within their own Java (J2SE, J2EE, J2ME) applications.
    Starting Price: from US$ 4,999
  • 13
    TorFX

    TorFX

    TorFX

    Every business is different, but our range of currency transfer services can be adapted to suit your company’s needs and help you protect your profit. We secure you the most competitive exchange rate available whenever you need to make an immediate transfer. Budget effectively and protect your funds from negative market shifts by fixing an exchange rate for up to two years in advance of making a transfer. Limit Order, target an exchange rate higher than the current rate and we’ll...
  • 14
    jPDFPrint

    jPDFPrint

    Qoppa Software

    ...Features: -Print any PDF documents -Print with or without user intervention (silent print) -Print documents from files, URLs or Java input streams -Support for latest PDF format -Flexible printing options -Runs on Java 6 and above -Works on Windows, Linux, Unix, Mac OS X (100% Java) -No third party software or drivers necessary
  • 15
    Briar

    Briar

    Briar

    ...Unlike traditional messaging apps, Briar doesn’t rely on a central server - messages are synchronized directly between the users’ devices. If the internet’s down, Briar can sync via Bluetooth or Wi-Fi, keeping the information flowing in a crisis. If the internet’s up, Briar can sync via the Tor network, protecting users and their relationships from surveillance. Briar uses the Tor network to prevent eavesdroppers from learning which users are talking to each other. Each user’s contact list is encrypted and stored on her own device. All communication between devices is encrypted end-to-end, protecting the content from eavesdropping or tampering.
  • 16
    Nutrient SDK
    Nutrient is the comprehensive solution for all your PDF needs, offering tools that effortlessly integrate and operate PDF functionality across any platform. 1. SDK PRODUCTS Integrate robust PDF functionality into iOS, Android, Windows, web (JavaScript), or any cross-platform technology, providing capabilities such as PDF viewing, markup, collaboration, and more. 2. LIBRARIES Utilize our potent .NET and Java libraries to boost your backend applications with batch processing of redactions and PDF forms, OCR’d scanned text, and editing of PDF documents, directly from your application server. 3. ...
    Leader badge
    Partner badge
    View Software
    Visit Website
  • 17
    Lokinet

    Lokinet

    Lokinet

    Lokinet is a decentralized onion router that enables anonymous internet access by leveraging the Oxen service node network as relays, providing market-based Sybil attack resistance through the Oxen blockchain. It supports web browsing, onion-routed real-time voice communications, and other applications without requiring specialized software or custom patches. Unlike Tor, Lokinet operates on the network layer, allowing it to onion-route any IP-based protocol, including TCP, UDP, and ICMP, facilitating activities such as media streaming and video conferencing. Lokinet's infrastructure is built on the Low-Latency Anonymous Routing Protocol (LLARP), designed to address issues present in other networks like Tor and I2P. ...
    Starting Price: Free
  • 18
    MINT Browser

    MINT Browser

    BetaTap Apps

    ...MINT Browser's architecture is designed to be speedy like a lightweight browser, but not lightweight in features. Not only does MINT Browser support proxying through Tor, but it also patches the infamous WebRTC bug that leaks sensitive information when Tor is used.
    Starting Price: Free
  • 19
    jPDFImages

    jPDFImages

    Qoppa Software

    ...Features: -Export PDF document pages as JPEG, TIFF or PNG images. -Import images into new or existing PDFs as new pages. -Support for PDF 2.0 (latest PDF format). -Save to the file system or to Java output streams. -Works on Windows, Linux, Unix and Mac OS X (100% Java).
  • 20
    jOfficeConvert

    jOfficeConvert

    Qoppa Software

    Convert Microsoft Word documents and Excel spreadsheets to PDF directly from your Java applications, without user intervention and without the need for any other software. jOfficeConvert is a Java library that can read and render MS Word and Excel documents natively to convert to PDF, to convert to images, or to print the documents automatically. The library is 100% Java so it can run on any platform that supports Java, including Windows, Linux, Unix (AIX, Solaris Spark, Solaris Intel, HP-UX) and Mac OSX. ...
  • 21
    NexVision

    NexVision

    NexVision Lab

    ...It offers deep, contextual intelligence encompassing targets, motivations, and threat analytics. The platform's advanced search algorithm discovers over 120,000 hidden Tor sites daily, enabling users to access the deep and dark web without the need for anonymizing browsers like Tor. NexVision's AI/ML-powered engine continuously collects, analyzes, and sorts big data from publicly available databases and the deep web, supporting multiple languages and equipped with natural language processing and steganography-decoding capabilities to detect hidden information used by advanced threat actors. ...
    Starting Price: Free
  • 22
    JOpt.TourOptimizer

    JOpt.TourOptimizer

    DNA Evolutions GmbH

    ...It can be customized to meet special requirements or adapt to the industries’ specific needs in which your software products are used. JOpt.TourOptimizer – enables you to enhance your product or project by seamlessly integrating DNA’s tour and resource optimization engine. It comes as a Java library or in Docker Container utilizing the Spring Framework and Swagger.
    Leader badge
    Starting Price: €995
    Partner badge
    View Software
    Visit Website
  • 23
    Zenlogin

    Zenlogin

    Zenlogin

    Zenlogin detects suspicious logins so you don't have to. A single API to notify your users when there's been suspicious login activity on their account. This threat detection includes observing VPN, TOR and Botnet traffic, to ensure any authentication or login attempts made by your users are legitimate.
  • 24
    DataMelt

    DataMelt

    jWork.ORG

    ...DataMelt can be used to plot functions and data in 2D and 3D, perform statistical tests, data mining, numeric computations, function minimization, linear algebra, solving systems of linear and differential equations. Linear, non-linear and symbolic regression are also available. Neural networks and various data-manipulation methods are integrated using Java API. Elements of symbolic computations using Octave/Matlab scripting are supported. DataMelt is a computational environment for Java platform. It can be used with different programming languages on different operating systems. Unlike other statistical programs, it is not limited to a single programming language. This software combines the world's most-popular enterprise language, Java, with the most popular scripting language used in data science, such as Jython (Python), Groovy, JRuby.
    Starting Price: $0
  • 25
    DHTMLX

    DHTMLX

    DHTMLX

    ...DHTMLX is also designed with performance in mind. Its components are optimized for fast rendering. A comprehensive and rich API provides a straightforward way to manipulate JavaScript/HTML5 UI widgets. The library has detailed API documentation, tutorials, and examples that help developers quickly get up to speed and start building their apps.
    Starting Price: $79
  • 26
    Enkrypt Wallet
    ...The core component of Enkrypt is a mix-net that protects network traffic meta-data for applications, providing communication privacy that is superior to both VPNs and Tor against global adversaries that can watch the entire internet.
  • 27
    Source Defense

    Source Defense

    Source Defense

    ...The Source Defense Platform provides a simple and effective solution for data security and data privacy compliance – addressing threats and risks originating from the increased use of JavaScript, third-party vendors, and open-source code in your web properties. The Platform provides options for securing your own code, as well as addressing a ubiquitous gap in the management of third-party digital supply chain risk – controlling the actions of the third-party, fourth and nth party JavaScript that powers your site experience. ...
    Partner badge
    View Software
    Visit Website
  • 28
    Searx

    Searx

    Searx

    ...Searx is a free internet metasearch engine which aggregates results from more than 70 search services. Users are neither tracked nor profiled. Additionally, Searx can be used over Tor for online anonymity. Get started with Searx by using one of the Searx-instances. If you don’t trust anyone, you can set up your own.
  • 29
    jPDFWeb

    jPDFWeb

    Qoppa Software

    ...Since it is written in Java, it allows your application to remain platform independent and run on Windows, Linux, Unix (Solaris, HP UX, IBM AIX), Mac OS X and any other platform that supports the Java run-time environment. Features: -Convert PDF Documents to HTML5 / SVG -Convert Microsoft Word & Excel Documents to HTML5 (when combined with jOfficeConvert) -Convert Text -Convert Images -Convert Vector Graphics -Convert Annotations, Links and Form Field Data -Convert Digital Signature Validation Status -Export Page Thumbnails -Support for CJK fonts -Support for latest PDF format
  • 30
    jPDFOptimizer

    jPDFOptimizer

    Qoppa Software

    ...jPDFOptimizer is built on Qoppa Software’s extensive PDF technology and requires no third party software or drivers. The library is 100% Java and can run on any operating system for which there is a standard Java implementation, such as Windows, Linux, Unix, Solaris and others. Features: -Modify image resolution, compression and color spaces -Compress images using JPEG, JPEG 2000 and JBIG2 -Compress data streams -Remove unused objects -Remove and merge duplicate images and fonts -Flexible optimization options -Linearize PDFs for fast web view -Support for latest PDF format -Support for JDK 1.6+
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next