Discover Nintex Workflow Cloud - the fastest, easiest way to improve the way you do business. This state-of-the-art technology - built in the cloud, for the cloud - gives you the ability to create powerful, integrated workflows independent of any single platform. With our intuitive, drag-and-drop workflow design canvas, you can configure and deploy automated business processes with speed and simplicity. Try it today!Sponsored Listing
- BSD (7)
- Grouping and Descriptive Categories (7)
- Linux (7)
- Mac (7)
- Modern (7)
- Other Operating Systems (7)
- Audio & Video
- Business & Enterprise
- Home & Education
- Science & Engineering
- Security & Utilities
- System Administration
Shows desktop information on your screen88 weekly downloads
The IRCd Conf manager util aims at automating ircd tasks such as configuration and compilation. Other options are also included such as automatich updates. This script will eventually be ready to be used for other irc networks. Requires ncurses/dialog
Design and Implementation of the Singhal token based mutual exclusion
The myriad of functionality that comes with Snare, from Verbose Truncation to Output Driven Filtering have been helping companies around the world zero in on threats in record time while spending less on their SIEM. This is made possible by reducing the noise in your log collection while delivering the critical data for both forensics and analytics, dependably. Snare just works. Try our agents free today!Sponsored Listing
Simple script of backup using tar for *NIX systems and written in bash, very easy to suit whatever backup policy, using complete, incremental or parcial backups. It has some features for esample mail notification, index of files, error notices, etc.
Modularized Server Administration Control panel and user panel to replace cpanel, plesk and directadmin. Modules will include but not limited to.. Billing DNS mail web auditing and much more..
antigift is simple cross-platform, files & folders encryption tool5 weekly downloads
sechk - SEcurity CHecKer It is a powerful and useful tool to check if you got exploited and rooted, it will use checksum comparation via md5 sum, it exchanges file lists and csums from the sechk server. It\'s gonna work with all posixes and unixes.