Password manager Software

OS OS

  • More...

Category Category

License License

Programming Language Programming Language

Status Status

Audience Audience

Password manager Software

  • The Sight of Sound The Sight of Sound Icon
    The Sight of Sound Icon

    ­ Improve VoIP Visibility from SIP to RTP

    Cloudbased voice solutions are common in enterprise networks and frustrating for operations teams to manage. Simplify VoIP monitoring by having a proactive analysis of on-prem, hybrid and UCaaS voice services. Try the ThousandEyes VoIP monitoring solution today, free.
  • Infrastructure and application monitoring for Azure Infrastructure and application monitoring for Azure Icon
    Infrastructure and application monitoring for Azure Icon

    Monitor your Azure® infrastructure, application, and systems performance side by side in a single enterprise-monitoring tool

    So, you moved your applications and servers to Azure, but are they running any better and are you able to justify the investment? Without proper monitoring, you’re left guessing if application and server performance has improved, and when issues arise, you’re left scrambling to locate the root cause. SolarWinds® Server & Application Monitor (SAM) can monitor your Azure workloads side by side with your on-premises workloads to help ensure optimal application performance.
  • KeePass Pronounceable Password Generator

    A pronounceable password generator plugin for KeePass. DISCLAIMER: Compared to traditional randomly generated passwords of the same length, pronounceable passwords are inherently weaker against brute force attacks. Using pronounceable passwords sacrifice some resistance against brute force attacks to reduce the risk of inadvertent password exposure. Whether this trade-off is worth it or not depends entirely on your use case. When using this application I recommend generating considerably longer passwords to make any brute force attack as difficult as possible. This application uses FIPS-181 for generating passwords and it is particularly vulnerable to brute force attacks that are targeted specifically towards the algorithm. I added modifications to the implementation (such as allowing the insertion of random numbers or symbols between syllables) with the intention of protecting against a targeted attack, but I cannot make any supported claims as to its effectiveness.

  • Previous
  • You're on page 1
  • Next

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you