The Netwrix Auditor Effective Permissions Reporting Tool enables you to quickly track down who has access to what across both AD and file servers, see how that access was gained, and get ready-to-use reports in a few clicks. It is free of charge and will never expire, so you can be sure it’ll be there for you when you need it most.Are you an IT pro at a company with 250+ employees?Advertisement
- Windows (4)
- Grouping and Descriptive Categories (3)
- Linux (3)
- BSD (2)
- Mac (2)
- Modern (2)
- Other Operating Systems (2)
- Android (1)
- Embedded Operating Systems (1)
- Audio & Video
- Business & Enterprise
- Home & Education
- Science & Engineering
- Security & Utilities
- System Administration
An operating system kernel designed with simplicity, readability, and elegance in mind. No longer written from scratch, but built on "the shoulder of giants." Specifics are given in the CREDITS file starting from v0.04
PeiAsm Multi-Processor Assembler/Emulator for x86 Windows. -Coded by M. Keaton (The Polyester Method)
Innovative prototype of network applications such as TCP fuzzers that can be used for many purposes such as network and application security assessments and more. Adapt it freely to fit your needs or to simply understand how TCP works in .NET.
Android[tm] SDK development is for those who have a dream mobile device in mind and have the potential to contribute to the development of the same at various levels. http://www.openhandsetalliance.com is promoted by Google & other industry giants.
Yet another shared stub implementation to integrate existing C (C++) legacy code provided as Win32 DLLs with Java applications.