finds you similar websites
auto-suggest    top sites

May 30th, 2024

13 Popular Sites Like Jasypt

moreofit.com has explored the net and uncovered tons of excellent java and security sites like Jasypt. Stop on by and find out about more webpages that are similar to Jasypt.

Displaying 61 to 70 of 500 alternatives to Jasypt. (Updated: May 30th, 2024)     [about these results]
Advanced Options
? Sort by:
popularity similarity
? Must Include:
? Cannot Include:
? Look For


 
You're looking for other sites like Jasypt:
  Jasypt: Java simplified encryption - Main
IMPORTANT: It is strongly advised not to use version 1.4 of the Apache Commons ... This problem will not arise if you use the default version of this library ...
http://www.jasypt.org/
popularity:
java
security
encryption
cryptography
opensource
library
hibernate
framework
spring
programming
new search by a custom tag signature
  TrueCrypt - Free Open-Source On-The-Fly Disk Encryption Software for Windows Vista/XP, Mac OS X and Linux - Documentation
No information avaiable
similarity:
popularity:
encryption
security
opensource
tools
software
truecrypt
filesystem
cryptography
freeware
privacy
  Java UUID Generator - Home
JUG generates UUIDs according to the IETF UUID draft specification (and further ... svn co https://svn.safehaus.org/repos/jug. Old Home Page ...
similarity:
popularity:
java
uuid
programming
generator
api
library
security
development
opensource
guid
  OVal - the object validation framework for Java™ 5 or later -
About OVal. OVal is a pragmatic and extensible validation framework for ... field/property validation OVal implements Programming by ... The OVal Development ...
similarity:
popularity:
java
validation
framework
aop
programming
opensource
aspectj
library
tools
development
  Programming With the Java XML Digital Signature API
No information avaiable
similarity:
popularity:
java
xml
security
signature
cryptography
programming
tutorial
development
api
howto
  A Lesson In Timing Attacks (or, Don't use MessageDigest.isEquals) | codahale.com
No information avaiable
similarity:
popularity:
security
cryptography
java
timing
programming
hacking
attack
crypto
statistics
python
  An Illustrated Guide to Cryptographic Hashes
Steve Friedl's Unixwiz.net Tech Tips. An Illustrated Guide to Cryptographic Hashes ... With the recent news of weaknesses in some common security algorithms ...
similarity:
popularity:
security
cryptography
crypto
hash
encryption
reference
programming
tutorial
algorithms
md5
  OpenSSL: The Open Source toolkit for SSL/TLS
Open source toolkit for SSL/TLS.
similarity:
popularity:
ssl
security
openssl
opensource
encryption
software
programming
linux
tools
cryptography
  Eliminating Enterprise Java Complexity | SpringSource
SpringSource tc Server: Apache Tomcat with mission-critical operational ... SpringSource dm Server: completely modular, OSGi-based Java server designed for ...
similarity:
popularity:
java
spring
framework
programming
opensource
development
tools
software
springsource
server
  Logback Home
The logback-core module lays the groundwork for the other two modules. ... Moreover, logback-classic natively implements the SLF4J API so that you can ...
similarity:
popularity:
java
logging
log4j
logback
framework
opensource
library
development
log
programming
  Free Java Certification Mock Exams and Resources[SCJP,SCJP 1.4,SCJP 5.0,SCWCD,SCBCD,Java1.5 and Java Related Jobs]@javabeat.net
Java certification resources. ... 2008 | 12 11 10 09 08 07 06 05 04 03 02 01. 2009 | 09 08 07 06 05 04 03 02 01. view all articles>> Subscribe to feeds. Enter email address: ...
similarity:
popularity:
java
programming
certification
tutorial
scjp
hibernate
struts
j2ee
spring
reference
< prev 1 ... 5 6 7 8 9 ... 50 next >
Sorting Results
  • This slider determines how the matched sites are sorted.
  • If you want to see the most popular sites that are somewhat related to your search, slide this more towards "popularity."
  • If you want to see the sites that best matched your search, regardless of popularity, slide this towards "similarity."
Must Include Tags
  • Matched sites will not be shown unless they have all of the tags on this list.
  • This feature is useful for when you require a site to have been tagged as something.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Must Not Include Tags
  • Matched sites that have any tag on this list will not be shown.
  • This feature is useful for filtering out results that have tags you are absolutely not interested in.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Types of Results
  • This option lets you specify the types of sites to show.
  • If you want to only see domains (www..com), select "domains only."
  • If you want to only see articles (www..com/something/here), select "articles only."
  • If you don't care, or care so much about both, select "Both".
About The Results
an example search result
How moreofit Searches
Each website has a unique tag signature -- a set of words that users have described the website as. Moreofit searches for websites that have similar tag signatures and displays the results.
1: Similarity
A site's "similarity" is determined by how well its tag signature matches the tag signature that is being searched for. A 100% match means that it has the exact same tags in the exact same order, while a 0% match means it has no tags in common.
2: Popularity
The popularity of a website is, well, pretty much self explanatory.
3: Tag Signature
The tag signatures show how a site is described. The deeper the color of the tag, the more frequently the website is tagged as this. Tags underlined blue denote a tag that is in common with the search's tag signature.