It's a modern take on desktop management that can be scaled as per organizational needs.
Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
Learn More
Instantly access exchange rates
EXCHANGE RATE API
Providing accurate, reliable FX Data for over 31 years, FX Data Services is where OANDA started out. Our flagship product, the Online Currency Converter serves millions globally while our Historical Currency Converter and Exchange Rates API help multinationals streamline their business processes with FX and Digital asset data that is trusted by the Big4 audit firms and thousands of businesses globally
BASE is the Basic Analysis and Security Engine. It is based on the code from the Analysis Console for Intrusion Databases (ACID) project. This application provides a web front-end to query and analyze the alerts coming from a SNORT IDS system.
At an early stage of development. Application/middleware usage monitoring/reporting. Focus on business transactions/use cases to help communicate with users. Small footprint, easy to use GUI and a level of statistical analysis to summarise the data.
An open source data version repository model based on true INSERT only logic. Contains high performance support for data versioning and history. Enables point-in-time query and CDC sourcing including mapping each change to a transaction.
Kojoney is an easy of use, secure, robust and powerfull Honeypot for the SSH Service written in Python. With the kojoney daemon are distributeds other tools such as kip2country (IP to Country) and kojreport, a tool to generate reports from the log fi
Built exclusively to provide a robust POS system for the restaurant and foodservice industry, with teams of all sizes.
Restaurant success isn’t built on one thing — it’s about a thousand little things coming together, every shift, every service. From FOH to BOH and every moment in between, manage it all with the POS that knows restaurants.
A simple keylogger written in python. It is primarily designed for backup purposes, but can be used as a stealth keylogger, too. It does not raise any trust issues, since it is a set of [relatively] short python scripts that you can easily examine.
A log player for "The Fourth Coming" ("T4C", http://www.the4thcoming.com).
Given a log-file, this tool will replay a T4C game you've played before.
It will have built-in functionnalities like : merging log files
together, searching and cleaning
a java based monitoring tool,logs all the user actions and errors with runtime data, displays execution performance and executed method lines. It doesnt modifiy class source files and no need for coding, just put it in your class path and see the mir
ZenTreasury brings cash forecasting, lease management, and treasury operations together in one intuitive platform
ZenTreasury is ideal for finance and accounting teams in businesses of all sizes
Designed for finance professionals, it simplifies IFRS 16 compliance, automates workflows, and provides real-time financial insights. Start for free with our Freemium plan and discover how ZenTreasury transforms the way you work.
My work as a system administrator and developer includes debugging software. I scan and filter logfiles many times a day. This tool can help you to color and filter your logfiles. So you can concentrate on the interesting things to do!
Prolix is an extension appender for the log4net logging framework. Prolix directs logging for an ASP.NET session to a separate tab in the browser. Since communication is over HTTP, users can watch logging data regardless of security constraints.
PFL can either operate as a stand-alone firewall log parser or set up to run and configure ipfw. The major focus is parsing, compressing, and filtering *NIX (to include Mac OSX) firewall logs generated by IPFW for quick and easy admin review.
Log4Cocoa is an Objective-C based port of the popular Java based logging package Log4J. Additionally, Log4Cocoa plans to provide pure C based bindings as well. Log4Cocoa is not affiliated with the Apache Jakarta project in any way.
The ProM Import Framework allows to extract process enactment event logs from a set of information systems. These can be exported in the MXML format, which is the standard event log data format for Process Mining analysis techniques.
The Genalyze log analyzer, a simple yet highly extensible framework for parsing log files, was designed for parsing T-Server log files generated by Genesys contact center software platform, yet is generic and easy enough to adapt for other log formats.
A tool to monitor internet hosts` bandwidth usage in a Linux-NAT network. A daemon collects data and clients display them (currently a Java applet with a graph). It automatically detects new hosts and has a nice summary statistic.
log4jdbc is a JDBC driver that can log SQL and/or JDBC calls (and optionally SQL timing information) for other jdbc drivers using the Simple Logging Facade For Java (SLF4J) logging system.
Like Unix-Tail BUT:
- Runs with or without GUI
- Suspend and resume tailing at runtime
- Can monitor a set of Files
- Print output to a textfield, stdout or file
- Runs in "Grep" mode, too (Read files once)
- (Almost) the same options as Unix-Tail
Log4j Viewer is an Eclipse plugin which can read various patterns of log4j's log file and show them in a structured table view which filtering, sorting, searching may apply on.
Gruppenarbeit für Unterrichtsfach VSYS (ADV-Böblingen) Ziel dieses Projekts war ein Java RMI-Programm, welches es einem Client ermöglicht Methoden auf einem "entfernten" Server aufzurufen (Projekt allerdings nur local getestet und nicht vollständig
Labrador is a Host-based Intrusion Detection System (HIDS) and Integrity Checker written entirely in Perl. It aims to be a complete, free, multiplatform, and open-source solution for detecting modifications and tamperings in files.
Strokey is a small hardware keyboard logger saving all keystrokes into an EEPROM memory for later investigation. The device may get attached to any PS/2-keyboard by intercepting the cable, or get placed directly inside for maximum invisibility.