Venn isolates and protects work from any personal use on the same computer, whether BYO or company issued.
Venn is a secure workspace for remote work that isolates and protects work from any personal use on the same computer. Work lives in a secure local enclave that is company controlled, where all data is encrypted and access is managed. Within the enclave – visually indicated by the Blue Border around these applications – business activity is walled off from anything that happens on the personal side. As a result, work and personal uses can now safely coexist on the same computer.
Manage what you buy and how you buy it with Order.co, so you have control over your time and money spent.
Simplify every aspect of buying for your business in Order.co. From sourcing products to scaling purchasing across locations to automating your AP and approvals workstreams, Order.co is the platform of choice for growing businesses.
This PAM module provides the ability for users to have encrypted directories which are mounted automatically on login and unmounted after logout. The Device Mapper's CRYPT target provides the encryption.
KSB26 [Kernel Socks Bouncer] is Linux Kernel 2.6.x loadable module that redirects tcp connections (to user-defined target hosts) through socks 4/5 chains, in a complete transparent way.
pamtester is a tiny utility program to test the pluggable authentication modules (PAM) facility, specifically designed to help PAM module authors to intensively test their own modules.
Raise the bar for remote support and reduce customer downtime.
ConnectWise ScreenConnect, formerly ConnectWise Control, is a remote support solution for Managed Service Providers (MSP), Value Added Resellers (VAR), internal IT teams, and managed security providers. Fast, reliable, secure, and simple to use, ConnectWise ScreenConnect helps businesses solve their customers' issues faster from any location. The platform features remote support, remote access, remote meeting, customization, and integrations with leading business tools.
Ce module en PHP permet de gérer les accčs ŕ des pages web de maničre trčs simple. Il repose sur une base de données MySQL et est livré avec une interface de gestion accessible via un navigateur internet.
Apache security module. Makes Apache configurable to work as diffrent user, group and diffrent chroot() environment for each VirtualServer and for ~user request. Designed mostly for ISP to make Apache secure.
LOMAC LSM is a Linux Security Module (LSM) based on the original LOMAC http://opensource.nailabs.com/lomac . LOMAC implements a simple form of Mandatory Access Control mechanism based on Bibas Low Water-Mark Access Control model.
Trustees is a recursive ACL scheme for the Linux 2.6 kernel's Linux Security Module(LSM) framework. If you have ever used netware, you will be familiar with the speed and convenience of the trustees' approach to ACLs.
Build, deploy, and scale machine learning (ML) models faster, with fully managed ML tools for any use case.
Vertex AI offers everything you need to build and use generative AI—from AI solutions, to Search and Conversation, to 130+ foundation models, to a unified AI platform.
httpcert is an apache module, that enables apache itself to manage x509 certificates efficiently, for Client Authentications over HTTPS.Through Web-Interfaces,Clients/Webadmin can create/submit/sign certificates using In-House CA Certificate.
The dude is a UNIX debugging package independent of the ptrace() system call; it consists of a kernel module [the_dude.o], a library to interface with the module [libduderino.so], and an ncurses client [ddbg] .
Cryproc is module for the Linux kernel 2.6 which allows user space programs to access the kernel's CryptoAPI functions via a file called "cryproc" created in the /proc filesystem.
Nasty LKM Defender is a module wich protects Your system against some nasty modules (e.g. rootkits).
Well mainly it protects sys_call_table and some other important functions (get_module_list, sys_query_module)
The Enforcer is a Linux Security Module designed to improve integrity
of a computer running Linux by ensuring no tampering of the
filesystem. It can interact with TCPA hardware to provide higher
levels of assurance for software and sensitive data.
User Manage is a module which could be included into any project. Created so developers can build applications with standard user authentication, and the ability to add extra functionality with drop in modules.
TrustedPickle is a Python module which lets you create and sign your data files. By using public/private key techniques, this module protects your users from loading malicious data files that others might claim you created. LEGAL FOR EXPORT.
xhelix: python C extension implementing Helix encryption and authentication.
Based on the article named "Helix: Fast Encryption and Authentication" by Niels Ferguson and Bruce Schneier, published in the Nov 2003 issue of Dr Dobbs Journal.
A Webmin module for maintaining the FreeBSD Firewall.
This module allows the user to configure the FreeBSD firewall via webmin.
Operating systems supported: Freebsd 4.7 and 5.x
This module runs under webmin > 1.070
Status Module is a daemon which forwards vital system information (memory usage, active processes, etc.) into the kernel logs by using a kernel module. This is very useful for logging or security purposes.
This is a client/server project. Server part is store information about logins in SQL database. Client part it\'s NSS-module for glibc. Client integrates into any program, which use standard getpw.../getgr...