Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
Learn More
AestheticsPro Medical Spa Software
Our new software release will dramatically improve your medspa business performance while enhancing the customer experience
AestheticsPro is the most complete Aesthetics Software on the market today. HIPAA Cloud Compliant with electronic charting, integrated POS, targeted marketing and results driven reporting; AestheticsPro delivers the tools you need to manage your medical spa business. It is our mission To Provide an All-in-One Cutting Edge Software to the Aesthetics Industry.
Magstripper is a magnetic card reader and decoder that takes raw waveform information from a magnetic audio head (soldered directly to a mono audio jack) and processes it via a mic input. It also includes a multi-user door lock access control system.
acegi usage example which contains some extended features:
1.get permission from db,
2.tag to test if the user has permission for an url
3.the permission can be refreshed when permission changes.
Say goodbye to broken revenue funnels and poor customer experiences
Connect and coordinate your data, signals, tools, and people at every step of the customer journey.
LeanData is a Demand Management solution that supports all go-to-market strategies such as account-based sales development, geo-based territories, and more. LeanData features a visual, intuitive workflow native to Salesforce that enables users to view their entire lead flow in one interface. LeanData allows users to access the drag-and-drop feature to route their leads. LeanData also features an algorithms match that uses multiple fields in Salesforce.
This project can be used to manage plugins in JAVA applications the framework provides checking of electronic signatures as well as hooks for user interaction (for example when certs are found that are not issued from a trusted authority
An open and distributed security scheme to prevent network service exploitation.
This work presents a non standard scheme using a distributed open approach to prevent network services exploitation.
This project provides a simple Java-based steganography tool that can hide a message inside a 24-bit colour image so that knowing how it was embedded, or performing statistical analysis, does not make it any easier to find the concealed information.
Open Eraser securely delete files by overwriting them. Every character in the file is overwritten so it is secure: softwares couldn't recover erased files by OpenEraser. Try it at http://www.aessepi.it/OpenEraser/dist/launch.html
Kasai is a 100% Java based authentication and authorization framework. It allows you to integrate into your application a granular, complete and manageable permission scheme.
Total Network Visibility for Network Engineers and IT Managers
Network monitoring and troubleshooting is hard. TotalView makes it easy.
This means every device on your network, and every interface on every device is automatically analyzed for performance, errors, QoS, and configuration.
How do you find anything in the mountain of data on your PC? How do you organise, maintain, archive and protect your files? How do you avoid surrendering to the Powers of Darkness? Checkpoint Commander, the vital tool for Information Management!
The High Interaction Honeypot Analysis Toolkit (HIHAT) allows to transform arbitrary PHP applications into a web-based Honeypot. A semi-automatic user interface supports the analysis process, scans for attacks etc.
The PCS Security Technology Evaluation Tool (P-STET) is a tool funded by the I3P which allows maintainers of Critical Infrastructure systems to evaluate and compare the costs and benefits of implementing cyber security technology.
S/Key Generator. An RFC2289 compliant One-Time Password generator written in Java language and O.S. Thinlet package for GUI.
It uses MD4 and MD5 hash algorithms.
Bork is a very small, cross-platform file encryption utility. It is written in Java and designed to be included along with the files it encrypts for long-term storage (eg on CD-R). Its minimal external dependencies make it fairly futureproof.
With SIP Proxy you will have the opportunity to eavesdrop and manipulate SIP traffic. Furthermore, predefined security test cases can be executed to find weak spots in VoIP devices. Security analysts can add and execute custom test cases.
Cryptomni is a program which can encrypt and decrypt files using the one-time pad cipher. If a key is truly random, kept secret, and never reused, this encryption algorithm can be proven to be unbreakable.
S/Key - OTP Generator for J2ME architecture. An RFC2289 compliant One-Time Password generator for mobile phone supporting Java language. It uses MD4 and MD5 hash algorithms.
wlfXchanger is a point-to-point communication software which enable developers to cooperate in a secure way, using an asymmetric encryption system (Public Key Cryptography).
An implementation of Shoup's "Practical Threshold Signature" in Java. This is an (n,k)-threshold signature system: at least k parties out of n must independently sign a piece of data to produce a valid group signature.