Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
Learn More
Find Hidden Risks in Windows Task Scheduler
Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.
Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
Atricore’s JOSSO is an open source and commercially supported Internet Single Sign-On (FSSO) solution for point-and-click and standards-based (SAML2) Internet-scale SSO implementations. For more information contact us at : http://www.josso.org
React Native Local and Remote Notifications for iOS and Android. firebase-messaging, prior to version 15 requires to have the same version number in order to work correctly at build time and at run time. The Firebase Android library firebase-core is no longer needed. This SDK included the Firebase SDK for Google Analytics. Now, to use Analytics or any Firebase product that recommends the use of Analytics, you need to explicitly add the Analytics dependency. Example folder contains an example...
Plug-and-Play Certification Authority is java implementation of Certificate Authority with web interface. It requires minimal setup and no extra database - it is pnp. It originally has been developed as a part of Unicore (http://www.unicore.eu/) suite.
Generate secure, production-grade apps that connect to your business data. Not just prototypes, but tools your team can actually deploy.
Build internal software that meets enterprise security standards without waiting on engineering resources. Retool connects to your databases, APIs, and data sources while maintaining the permissions and controls you need. Create custom dashboards, admin tools, and workflows from natural language prompts—all deployed in your cloud with security baked in. Stop duct-taping operations together, start building in Retool.
...It is a flexible, extensible, and secure alternative to tokens, certs and passwords. Application & API support exists for Java, ASP, PHP, Ruby, OpenVPN, TACACS+, etc.
Read our eGuide on how to setup your network with two-factor authentication: http://www.wikidsystems.com/learn-more/two-factor-authentication-white-papers
Encrypt and decrypt text using AES 256 bit encryption
...AESTextCrypt uses AES-256 bit encryption which is the strongest available encryption scheme. It also employs bcrypt, which implements key-stretching and an adaptive key setup phase, the complexity (number of rounds) of which is automatically set to match the processing power of the encrypting computer. This makes it highly resistant to dictionary attack.
AESTextCrypt is written in Java, so can be run on all desktop platforms - Windows, Mac and Linux.
IOS6 and recent iTunes updates have broken a few features. We have made some partial fixes, but they are not complete. If you'd like to help support our development, or take over the development please let us know.
Explore the internal file structure of your iphone (or of a seized phone in the case of forensic teams) using either the iphone's own backup files or (for jail broken iphones) ssh. Viewing of plist, sqlite, and hex are supported. IOS 5 is now supported
iOS 6 only partially...
NSIA (Network System Integrity Analysis) is a web application monitoring system that scans web applications for potentially unwanted context such as defacements, unauthorized changes, errors, information leaks, profanity, compliance issues, etc
The Digital Communication Systems Lib: This library contains digital communucations systems implementations, such as BSPK and MIMO - WOFDM. Various OpenSource Projects: 1. Password/Username/Domain Analyzer
FONC (FTP Over Normal Connections) allows both active and passive FTP transfers via normal port connections. This allows FTP (both control and data transfers) over simple ssh tunnels among other things. FONC is easy to setup, and runs anywhere java can.
ANts P2P realizes a third generation P2P net. It protects your privacy while you are connected and makes you not trackable, hiding your identity (ip) and crypting everything you are sending/receiving from others.
It's a tool for testing HTTP servers and Web applications. It supports HTTP/HTTPS protocols, GET,POST and HEAD methods, HTTP proxies, refferes and cookies. It's like HTTP Debugger in network tool AccessDiver or HAS.
NetworkTools has 2 components: A protocol analyzer which plays a TCP client or server or pipeline, which sits between a client and server and shows how they communicate. A port scanner can scan a range of IP addresses and ports. See screenshots.
DNA is an open, flexible and extensible deep network analyzer software server and software architecture for gathering and analyzing network packets, network sessions and applications protocols, passively off enterprise class networks.
Visual IP is a network protocol
analyzer that works in any operating system with a java VM. At the
moment it only allows you to examine data from the disk, and created
by tcpdump. You can interactively browse the capture data, viewing
summary and det
An alternative Identification system that is a replacement for Microsoft's Passport and the Liberty Alliance. Its a simple architecture that is setup so anyone can run a server and thereby have control over their online identification.
The E language is an open-source object-oriented langauge for secure
distributed computation. We are currently hosted on our own sourceforge setup at: http://bugs.sieve.net/projects/e-lang
Meergoose is a multi-use social suite of applications that allows users to setup a portal on their personal computing platform that encrypts and stores files locally and synchronizes encrypted files with a secure cloud.
MeerCrypt is a component of Meergoose and is opensource. The vision is simple: Encrypt Locally. Share Remotely. YOU remain in control of your security, your keys, your data.