Looker is an enterprise platform for BI, data applications, and embedded analytics that helps you explore and share insights in real time.
Chat with your business data with Looker. More than just a modern business intelligence platform, you can turn to Looker for self-service or governed BI, build your own custom applications with trusted metrics, or even bring Looker modeling to your existing BI environment.
Fully Automated Process in One Tool: From Purchase Orders to Budget Control and Reporting.
For minor company expenses, you might utilize a spend management solution or track everything in spreadsheets. For everything more, you'll need Precoro. We help companies achieve procurement excellence and budget efficiency by building transparent, predictable, automated spending workflows.
Three software packages to work with RFC2617 digests: libdigest (C library to compute digests), libcppdigest (C++ library to manage /etc/passwd-like files) and libpam-digestfile (PAM module allowing authentication via an /etc/passwd-like file)
Zeus provides an API for developers to protect with AES Encryption and compress with ZIP application specific data not intended for public access. Zeus, the tool, integrates with Windows Explorer to protect sensitive data.
Open Legacy Storage Document: Generic Document Archiving on Disk and Network(using MINA) Framework in Java for huge number of docs(up to 2^192 documents), efficient(Java NIO), crypto, net transfert, web retrieve, J2EE and eMail archiving compatible.
PGP, short for Pretty Good Privacy, is a public key encryption package; with it, you can secure messages you transmit against unauthorized reading and digitally sign them so that people receiving them can be sure they come from you.
For Software Engineers, DevOps, Data Architects, and IT Leaders
The progression to modern application stacks and microservices architectures has resulted in orders of magnitude more logs, metrics, events, and traces. Like gravity, data attracts more data, making it increasingly difficult to move and process as it accumulates over time. More than ever, there is a need to be able to stream-process, filter, mask, transform, aggregate, analyze, and route that data to various data tier destinations optimized for specific usage.
libShred is a preload library that attempts to intercept file deletion and truncation to shred the data before removal. It may be able to add an extra layer of security to your other applications, such as web browsers.
This project is dedicated to creating encryption programs, along with their decryption counterparts. The encryptor will encrypt any file (that I've tested) and decrypt a file.
Cnc's IP Data Volume Report:
Logs IP to IP contact, number of packets, bytes, time of contact, Ethernet too!
View via local web interface.
Very simple for those who want to view who your computer is contacting the most!
Software and support solutions to protect your clients’ critical business assets
ConnectWise SIEM (formerly Perch) offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see beyond your network traffic. Our team of threat analysts does all the tedium for you, eliminating the noise and sending only identified and verified treats to action on. Built with multi-tenancy, ConnectWise SIEM helps you keep clients safe with the best threat intel on the market.
FSFS is a secure distributed file system in user space built over FUSE and OpenSSL. It stores AND transfers data between clients and server in secure form, leaving most of the cryptography to the clients, thus relieving the server of the additional work.
A Win32 API based graphical desktop sharing system, it support LZMA compress, MD5 password check, 64bits file transfer, 8bits instruction fast protocol and windows's pack intelligence for reduce useless transfer band.
This software is a set of tools that hides C source code in txt files. Also the software is able to restore the txt files to C source code again. This work is based on the tool c2txt2c by Leevi Martilla. Csteg needs a book file in txt format to hide C so
Generic file fuzzer. It has some "advanced" features like deep tracing into child child's and also it can "recognize" text format of the input files (if they are ASCII).
integrit is a simple yet secure alternative to products like tripwire. It has a small memory footprint, uses up-to-date cryptographic algorithms, and has features that make sense (like including the MD5 checksum of newly generated databases in the report
Steganography tool which establishes a full-duplex steganographic data transfer protocol utilizing Real-time Transfer Protocol (RTP) packet payloads as the cover medium. The tool provides interactive chat, file transfer, and remote shell access.
The certificate daemon, certd, is a (X.509) certifcate discovery and validation daemon that can be used by network clients to acquire information concerning issued certificates (e.g., validity, fingerprints etc.)
EM stands for enforcement module. It is a security module which create bastion host machine. the process involved reading an XML policy file and translate it into Linux/Unix system call set. the translation process is created by CSG(command set generator
GNUWire is a centrally managed, multi threaded file integrity checker / intrusion detection tool. It was written from the ground up with security, portability, scalability, performance and user interface in mind.
Stegeek is very simple tool, that takes several files,encrypt, and mix them into one file. Also add some redundancy. The result is, that we have one archive and N keys. It should not be possible to guess N, if you have archive and up to N-1 keys.
Collection of open source security tools that enhance the ability of people and companies to secure their environment. These tools will build upon the foundation laid by the security community.
pam_vserver is a GNU/Linux PAM module that allows automagic login of a user into a Linux-VServer. It comes with a configuration file in which you can choose the vserver to log in, based on username or group membership.
apGuard is very easy to use program which allows to automatize the process of setting permanent rights for files and directories (using the configuration file). Works on linux, and probably on other UNIX systems.
CGI program for Third Party Relay Checking or Open Relay Checking.
Localization support of output messages potentially.
Developped under FreeBSD 4.x and some *BSD specific functions are used.
This project provides a user-level command to edit NFSv4 Access Control Lists
(ACLs). The command allows users to display and change NFSv4 ACLs from
clients that do not have complete NFSv4 ACL support.