We help different businesses become digital, manage projects, teams, communicate effectively and control tasks online.
Plan more projects with Worksection. Use Gantt chart and Kanban boards to organize your projects, get your team onboard and assign tasks and due dates.
Define and Deliver Comprehensive Cybersecurity Services. Security threats continue to grow, and your clients are most likely at risk. Small- to medium-sized businesses (SMBs) are targeted by 64% of all cyberattacks, and 62% of them admit lacking in-house expertise to deal with security issues. Now technology solution providers (TSPs) are a prime target. Enter ConnectWise Cybersecurity Management (formerly ConnectWise Fortify) — the advanced cybersecurity solution you need to deliver the managed detection and response protection your clients require. Whether you’re talking to prospects or clients, we provide you with the right insights and data to support your cybersecurity conversation. From client-facing reports to technical guidance, we reduce the noise by guiding you through what’s really needed to demonstrate the value of enhanced strategy.
ipfw LogViewer & Analyzer - a utility written in PHP, that can be used to view and analaze ipfw logfiles. Contains a search form, a database backup/restore feature. Can draw graphs from the collected data. Contains a wizard-like logfiles import tool.
JAWS - Jefferson AWS, linux port of AWS weather station interface. JAWS runs on a linux computer connected via serial to a AWS datalogger. It then logs and sends weather data. The data can be sent to a csvlog file, wundergound, and mysql.
Java Squid Log Analizer with PHP Web Viewer.
At this stage a tool called log2sql is already available a can load squid access.log files into a normalized DB. Tester are welcome..
Application to display, as well as interpret, firewall information from a database to serve a variety of users needs. The application is online and cross-platform, written using PHP.
... "drop in" replacement for the mysql_query call. From there, a simple search/replace on the codebase.
The auditor will capture "who did what" and "when". It is also smart enough to fully parse the raw MySQL query and compare updates to existing rows. Only actual changes are recorded in the audit log (database table) regardless of the SQL.
Finally, a simple web viewer for reviewing and managing the audit trail. Job done. :-)