AI-powered service management for IT and enterprise teams
Enterprise-grade ITSM, for every business
Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
Try it Free
Earn up to 16% annual interest with Nexo.
Access competitive interest rates on your digital assets.
Generate interest, borrow against your crypto, and trade a range of cryptocurrencies — all in one platform.
Geographic restrictions, eligibility, and terms apply.
Security-Tools Database is an easy to use tool to manage tool-tipps (e.g. from the SecurityFocus.com Newsletters and other sources). Simply copy + paste tipps from the newsletter or enter tipps manually. Finds tools by any combinations of search criteria.
ProSum is a terminal based program that protects your files, sys_call_table and IDT like tripwire way (All in user space, without kernel modules) In addition, database with files etc. could be encrypted with Blowfish algorythm and more.
CuteFTP Password Recovery (cutepr) is a small utility that recovers passwords stored in CuteFTP's database, sm.dat. Sometimes users store the passwords, and then forget them. This utility searches through the database and displays all the site informati
Track all IP/TCP, IP/UDP, NetBeui, IPX/SPX connections and ARP/RARP traffic. Optionally save connections in MySQL database. Implement http server so you can view connections with web browser or GTK client. Can send fake ARP reply and kill TCP connection
Unlimited organizations, 3 enterprise SSO connections, role-based access control, and pro MFA included. Dev and prod tenants out of the box.
Auth0's B2B Essentials plan gives you everything you need to ship secure multi-tenant apps. Unlimited orgs, enterprise SSO, RBAC, audit log streaming, and higher auth and API limits included. Add on M2M tokens, enterprise MFA, or additional SSO connections as you scale.
This is a CDL class capable of Tripple DES encryption/decryption. It operates on InterSystems Caché DBMS.
The entry points ##class(ACB.GMI).DES3Enc and ##class(ACB.GMI).DES3Dec perform these functions.
This application allows you to capture the logging messages about network activity from your Linksys cable/DSL modem routers and store it in a database. The beginings of a PHP web based front end is also included as a separate module.
WebBTS - WebBTS is a tool created with PHP and MySQL to trace and mantain a bug database from the Web. With WebBTS you can manage bugs from a centralized place. WebBTS has suport to notify of operation on bugs via e-mail.
The Registry Server (jUDDI) offers a mechanism for humans or software applications to advertise and discover Web services. The Java Web Services Developer Pack (Java WSDP) Registry Server implements Version 2 of the Universal Description, Discovery and I
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
scroll is a file integrity scanner. It is designed to be a fast, secure replacement to Tripwire, and is implemented using OpenSSL. Current database
support includes local file and MySQL.
An English-language HoChiMinh-City Linux User Group focused on researching, developing and promoting Free, Linux & Open-source information systems for improving collaboration between SaiGon and the rest of the world.
MSSQL substructure. Provides a modular set of user, group, and object level permissions that function independent of the inherent MSSQL security. Desigened to drop into any database aplication.
A password manager that is able to encript data in various algorithms and store them in file, database, ...
It is written in 100% pure Java using only Java technology.
Packet2sql will convert any text file/log file which contains ipchains packet logs into a stream of SQL inserts which can be used as the base for a firewall-analyzing database application.
A lightweight (distributed?) network security monitor for TCP/IP+Ethernet LANs. It will capture certain network events and record them in a relational database. The recorded data will be available for analysis through a CGI based interface.
RanPass 2.0, the successor to the simple and MS-DOS interfaced RanPass 1.0. RanPass is a Random Password Generator. RanPass will use a unique Algarythm(s) to generate a Random Password. This type of software is really useful to a Secure Network.
...It can be installed with most of BSD/Linux systems. The main goal is to provide a web based console for security monitoring, including searching tools through IDS/FireWall/SYSLOG database.
ethernet host availibality monitoring (logging to sql/file)
checks active hosts with database/files
active operation - contously sends out arp packets and tries to detect promiscous mode enabled machines
Web-based IT-Security evaluation tool targeted at small- and medium-sized companies, based on the Austrian IT-Sicherheitshandbuch, ISO 27001, and other IT-security standards.
Adytum is a certificate authority suite, powered by OpenSSL, specifically designed for internal use small enterprises which need a secure and robust PHP solution without the rich feature set of software aimed at large retail CAs.
Terrier is a RBAC framework, business oriented and with focus on manageability and access control. Integrating all company tecnhnologies (java, ruby, delphi and others). The owner of a system can manage and delegate manageability to the systems, reducing