�� ��U
THIS PROJECT IS STILL IN EARLY DEVELOPMENT IT USES EXPERIMENTAL CRYPTOGRAPHIC LIBRARIES AND IT HAS NOT HAD ANY KIND OF SECURITY OR CRYPTOGRAPHY REVIEW THIS SOFTWARE MIGHT BE BROKEN AND UNSAFE https://xkcd.com/949/ WebWormhole creates ephemeral pipes between computers to send files or other data. Try it at https://webwormhole.io or on the command line. On one computer the tool generates a one-time
Calla adds a small, RPG-style map to the Jitsi meeting view. It gives you an avatar to walk around the room. Users choose where to sit in relation to other users. Users very close to you are set to full volume. Users a little far away have their volume scaled down accordingly. Users too far away to care about are rendered with zero volume. Visit the current installation at www.calla.chat. Enter a
Augment your current security infrastructure to store and index network traffic in standard PCAP format. Arkime offers full network visibility, facilitating the swift identification and resolution of security and network issues. Visibility Security teams gain access to the necessary network visibility data essential for responding to and investigating incidents to expose the full attack scope. Sca
WebWormhole lets you send files from one computer to another.
Run code online in the browser. 45 languages supported: Assembly,ATS,Bash,C,Common Lisp,Clojure,COBOL,CoffeeScript,C++,Crystal,C#,D,Dart,Elixir,Elm,Erlang,F#,Go,Groovy,Guile,Hare,Haskell,Idris,Java,JavaScript,Julia,Kotlin,Lua,Mercury,Nim,Nix,Ocaml,Pascal,Perl,PHP,Python,Raku,Ruby,Rust,SaC,Scala,Swift,TypeScript,Zig,Plaintext
リリース、障害情報などのサービスのお知らせ
最新の人気エントリーの配信
処理を実行中です
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く