Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
Learn More
AI-generated apps that pass security review
Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.
Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
A network security analysis and monitoring toolkit Linux distribution.
Network Security Toolkit (NST) is a bootable ISO image (Live USB Flash Drive) based on Fedora 42 providing easy access to best-of-breed Open Source Network Security Applications and should run on most x86_64 systems.
The main intent of developing this toolkit was to provide the security professional and network administrator with a comprehensive set of Open Source Network Security Tools. The majority of tools published in the article: Top 125 Security Tools by INSECURE.ORG are available...
A very nice MSN compatible messenger application, aMSN Messenger is a multiplatform MSN messenger clone. Works pretty much like its Windows based counterpart. Perfect for keeping in touch with those friends who have not yet seen the light. Works on linux
Jkaptive is a simple captive portal without RADIUS and thus, without total security, but at the same time. without too much hassle. The reason behind this is because a lot of site administrators don't need tight security - their site is just a café which offers free internet access on an unsecured WLAN access point connected to the internet and they need a ticketing system to make it cumbersome for average people to use this offering without actually buying a single coffee.
Jkaptive...
Software from LoCI Laboratory is devoted to information logistics, the study of the flexible coscheduling of the physical resources that underpin computer systems: storage, computation, and data transmission. We use IBP, L-Bone, exNode and LoRS.
XBashServ is a program written in Tcl to help set up and run game server programs and some other general network server programs on UNIX systems. It also works on Microsoft Windows but is experimental.
The TclSOAP package provides a mechanism to bind Tcl command procedures to remote procedure calls using the Simple Object Access Protocol (SOAP) and XML-RPC over HTTP. Both client and server code is provided.
For companies looking to automate their consolidation and financial statement function
The software is cloud based and automates complexities around consolidating and reporting for groups with multiple year ends, currencies and ERP systems with a slice and dice approach to reporting. While retaining the structure, control and validation needed in a financial reporting tool, we’ve managed to keep things flexible.
This tools (containing a client and a server) behaves as a proxy and aggregates small packets, making big ones. It prevents sending a lot of small packets to the network (generally WAN) and prevents bandwidth usage by decreasing the overhead generated by
daitrix is a secure os built on security, ease of use, and linux/unix based. verry fast to install with 4 setup types- dev, server, desktop and all. everything a normal linux distro has and then some.
GUI front-end to: socket client and socket server, port scanners, ping, trace route, whois, NS look-up (ei: dig), finger, service, chkconfig, netstat and a command-line huff... puff... A mouth full? Nahh a full net tool application!
A device server inteded for (but not limited to) use with 3D input devices (like dynasight, Polhemus FASTRAK, motionstar and the magellan spacemouse).
Devices can be configured via a remote TCP connection.
Device data is sent to registered clients via