Showing 7 open source projects for "whitelist"

View related business solutions
  • Hybrid Workplace Software Icon
    Hybrid Workplace Software

    We help businesses return to work safely without compromising on employee experience.

    With YAROOMS, facility managers gain control over occupation parameters and get insight on actual reservations, while HR managers can define work planning targets and thresholds for their teams. Employees remain autonomous to schedule their own time, resources, and space in the office.
  • Strategy Execution Software | CI Project Management Icon
    Strategy Execution Software | CI Project Management

    Best for mid to large companies with a strategy that includes Continuous Improvement

    KPI Fire is Strategy Execution / Continuous Improvement Software that aligns your Improvement projects with your strategic goals and KPIs.
  • 1
    FastTunnel

    FastTunnel

    Expose a local server to the internet

    FastTunnel is a high-performance cross-platform intranet penetration tool. With it, you can expose intranet services to the public network for yourself or anyone to access. Unlike other penetration tools, the FastTunnel project is committed to creating an easy-to-extensible and easy-to-maintain intranet penetration framework. You can build your own penetration application by referencing the nuget package of FastTunnel.Core, and target the business extension functions you need.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    GnuCopy
    GnuCopy is an Open-Source tool to copy and archive all your important data. It supports all important archive typs like Zip and Tar to guaranty an easy and secure exchange between all types of operating systems. Additionally, you can create profiles to blacklist or whitelist specific file types or folders to seperate your big data stores for backups.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    Windows Defender Central v0.5

    Windows Defender Central v0.5

    Windows Defender Central

    ... are the "computer name" background colors? -White: idle -Green: querying state -Pink: any other action besides querying -Red: one or more protections are disabled It can't show color on the highlighted row... What is planned? -to see the quarantine -delete from quarantine -whitelist from quarantine What else?
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4

    UpdApp

    custom Minecraft server files update program

    This tiny app lets you update the generated Minecraft server.properties file from a custom property file. The same applies to the ops and the whitelist file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • CRM for Nonprofits | Virtuous Icon
    CRM for Nonprofits | Virtuous

    Virtuous is the responsive fundraising platform proven to help nonprofit organizations increase generosity by serving all donors personally

    Virtuous gives you the nonprofit CRM, fundraising, volunteer, and marketing tools you need to create more responsive donor experiences and grow giving.
  • 5

    The Homework Clock

    Designed to help users who wish to manage their time better.

    The Homework Clock is an application designed to help users who wish to manage their time better. Its purpose is to let the user know how much time they spend on working and how much time they spend off-task. The Homework Clock has 2 timers. One keeps track of the time spent on working, the other keeps track of the time spent off task. At the most basic level, the Homework Clock can switch, stop, and clear timers. Only one timer will be running at a time. The Homework Clock has many...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Backup tool for MySQL to automatically / manually create sql dump files, for data, table structure, functions and stored procs. Can run via the task manager for backups on a regular base. Backup can be zipped with a password and saved on a server.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 7
    With the Log Parser one can scan logs, whitelist out legitimate, non-corrupt entries (usually file paths), and apply a standard format to a log generated by any antivirus or malware-removal program. This makes for easier reading of the meat in any log.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next