Trusted by nearly 20,000 customers worldwide, and all major cloud providers.
OpenVPN's products provide scalable, secure remote access — giving complete freedom to your employees to work outside the office while securely accessing SaaS, the internet, and company resources.
Get started — no credit card required.
Payroll Services for Small Businesses | QuickBooks
Save 50% off for 3 months with QuickBooks Payroll when you Buy Now
Easily pay your team and access powerful tools, employee benefits, and supportive experts with the #1 online payroll service provider. Manage payroll and access HR and employee services in one place. Pay your team automatically once your payroll setup is complete. We'll calculate, file, and pay your payroll taxes automatically.
Querylog is a console tool for performing SQL queries on a (log) files. Lines from one or more text files or stdin are matched, using regular expressions to an in memory database on which SQL queries can be performed.
Save both incoming and outgoing Internet traffic (all data sent or received by browser, email client, instant messenger, media player and etc.) on the hard drive for future use.
This simple program watches the syslog's or metalog's log file and pops up the window whenever the new message comes. You can specify the file to watch and a regular expression for parsing the log line, so you can watch other than log files too.
LogAnalyzer application is aimed to detect anomalies in Windows behavior which can appear because of attacks, viruses activity, software and hardware failures by performance counters data real-time analysis implemented by specific data mining algorithms
Testeum is a Software Testing & User Test platform
Tired of bugs and poor UX going unnoticed despite thorough internal testing? Testeum is the SaaS crowdtesting platform that connects mobile and web app creators with carefully selected testers based on your criteria.
bbacpi is simple tool for X that shows some information on the battery of laptops using acpi.
Main features are (all optionals): battery level (gauge & label), battery lifetime, temperature (gauge & label), state of adapter (label or graphics).
Echelog is a distributed system consisting of agents and one or
more servers. Agents, distributed on computers over network, are monitoring the
state of hosts and network. Collected data are sent to servers where they are processed and stored.
Windows Error Reporting Eliminator (WERE) is a dll that will stop the sending of your dumps to Microsoft. It allows you to disable WER on the program you are adding the dll to. The dll can be configured to create a full dump locally and more.
loginote is a program to immediately display a note on screen (using xosd) when a user logs into the system or logs out again. Just imagine someone knows your password and you might be interested when he/she logs into your system.. ;). loginote will tell
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
Xianc gets statistics mostly from a firewall program like iptables but it supports a file as input too. The byte counter from the an interface in Window can also be used. Xianc can show bandwith usage, stores it in a cache file to survive a reboot, and c
A tool to monitor and analyse data transmitted between clients
and a server through a TCP connection. This tool focuses on the data stream
(software layer), not on the lower level transmission protocol as
packet sniffers do.
This project intends to build a complete CallerID-function for home- or small buisniess environments. It depends on simple hardware which everyone can build. It will present the incomming call's number on every workstation on the network.
Description: TetraLog logs ALL the pressed keys to the file vxd1689.dll
INCLUDING windows special keys and MOUSE BUTTONS, separating each entry with a Date tag. Read the readMe.txt for more stuff this program can do.
Templario is a security event audit and compliance suite which helps you to monitor enterprise security from one central console. Templario automates and consolidates complicated enterprise network security auditing and requires near-zero administration.
LogViewer is a logfile monitoring tool for KDE 3.2.x that docks into the panel, supporting docking (new!), multiple colors, up to 10 logfiles, filtering via regular expressions and pop-up events when a specific line is added to a monitored logfile.
NLAT is a tool that let you easily admin few tasks while logging in a Samba PDC, performing a set of operation you otherwise have to complete manually on each PC. NLAT is particulary useful in medium size and large size networks.
The whole system is com
The Looper Event / Alert System is an application primarily used for network management to perform alert monitoring and redirection. It is designed with extreme simplicity in mind and is highly modularized. Also used as a Netcool probe or gqateway.
The 'Monitor' application, which consists of 2 parts, a MonitorServer (linux daemon) and a MonitorClient (java gui), will enable the user to monitor and log server process, memory, network and cpu information of multiple servers at a time.
SyslogMonitor is a KDE Kicker aplication, that monitors system log using a pipe and syslogd redirections, and filters catched messages through a list of user-defined filters.
This project was written in C++ using MS MFC. So, it is built only for Windows using VC++ .NET. The application indexes the windows file system into a readable listing. This is useful for things like FTP servers to show file listings in their root.
Automated Security Tools (autosec) aims to provide
automatic tools which network administrators may use
to help check and test the security of their network.
Dryad is a real time log analysis daemon, capable of responding to events as they happen. It is highly configurable, allowing for maximum control over the entire process.