Showing 4 open source projects for "customizable"

View related business solutions
  • Earn up to 16% annual interest with Nexo. Icon
    Earn up to 16% annual interest with Nexo.

    More flexibility. More control.

    Generate interest, access liquidity without selling, and execute trades seamlessly. All in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1
    Secure Eraser

    Secure Eraser

    Delete sensitive files, folders & drives securely & clean your system

    Secure Eraser by ASCOMP is a powerful data deletion tool designed to permanently remove sensitive files and personal information from your computer, making it ideal for users who prioritize security and privacy. Using advanced data-wiping algorithms, including DoD 5220.22-M, Gutmann, and other international standards, Secure Eraser ensures that deleted files cannot be recovered by any method, providing peace of mind when disposing of hard drives or cleaning up confidential information. In...
    Downloads: 32 This Week
    Last Update:
    See Project
  • 2
    DiskBoss

    DiskBoss

    File management, file sync, and data wiping tool

    DiskBoss is an automated, rule-based data management and analysis solution designed to give users complete control over their storage environments. It enables advanced disk space analysis, file classification, duplicate detection, and secure cleanup operations — all within a fast and customizable interface. The software supports high-speed file synchronization and secure data migration, ensuring reliability and data integrity across systems. Users can create automated policies to perform real-time disk monitoring, scheduled cleanups, and bulk file operations with minimal manual effort. Its integrated command-line utility and server version extend automation and scalability for enterprise use. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    NDW - Network Data Wiping Hard Disks HDD

    NDW - Network Data Wiping Hard Disks HDD

    Wipe erase data from hdds on the network, unlimited hard disks

    Automated network based hard disk drives / storage devices erasure is server based software which installs on a central server. Server is connected to network switches and several PXE boot enabled workstations are attached to the network. As soon as the workstation is powered on, it boots off the network via the server and begins wiping all the attached hard disk drives. Once all the hard drives are wiped, data related to each hard disk is stored in the central server’s database. Read...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 4
    dotNet Disk Imager

    dotNet Disk Imager

    Lightweight RAW and ZIP disk images reader and writer to USB or SD

    IMPORTANT!!! Since this is new software, your web browser, operating system or even possibly antivirus software may report security alerts against this tool. Please ignore that messages until this tool gets widely spread. This program is highly inspired by Win32 Disk Imager and sort of copies it's function. However, I've added some features, like verification of readed/writed image file and the most important is on the fly support for zipped images. Another features worth...
    Downloads: 9 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB