Showing 5 open source projects for "e-root"

View related business solutions
  • Red Hat Enterprise Linux on Microsoft Azure Icon
    Red Hat Enterprise Linux on Microsoft Azure

    Deploy Red Hat Enterprise Linux on Microsoft Azure for a secure, reliable, and scalable cloud environment, fully integrated with Microsoft services.

    Red Hat Enterprise Linux (RHEL) on Microsoft Azure provides a secure, reliable, and flexible foundation for your cloud infrastructure. Red Hat Enterprise Linux on Microsoft Azure is ideal for enterprises seeking to enhance their cloud environment with seamless integration, consistent performance, and comprehensive support.
  • Top-Rated Free CRM Software Icon
    Top-Rated Free CRM Software

    216,000+ customers in over 135 countries grow their businesses with HubSpot

    HubSpot is an AI-powered customer platform with all the software, integrations, and resources you need to connect your marketing, sales, and customer service. HubSpot's connected platform enables you to grow your business faster by focusing on what matters most: your customers.
  • 1
    Private File

    Private File

    Container software to encrypt files.

    Software contenitore per crittare file. E' possibile creare un albero di cartelle e gestirle a proprio piacimento, i file inseriti nel programma vengono automaticamente crittati e mostrati come in esplora risorse. Tutti i dati crittati vengono gestiti da un file salvato in una posizione decisa dall'utente. E' possibile gestire più archivi, e salvarli su pen-drive o altro supporto removibile. . Container software to encrypt files. It is possible to create a tree of folders and manage them...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Hidden Gestione Password

    Hidden Gestione Password

    permette di salvare i codici segreti e le password

    MiCla Hidden "Gestione Password" permette di salvare tutti i codici segreti e le password che si hanno in possesso, compreso codici di accesso con scadenze. La finestra principale mostra la lista delle schede salvate in archivio "Schede Salvate", cliccando una voce, verrà mostrtato il contenuto nei vari campi. Utilizzare le scelte ("Modifica" e "Nuova") del menù principale per modificare o inserire una scheda (vedi Scheda Dati). MiCla Hidden conserva i dati in un archivio codificato con...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Password generator

    Password generator

    Software per generare password casuali di lunghezza variabile

    Software per generare password casuali di lunghezza variabile, in varie modalità e affidabilità, inoltre può attingere ai vocaboli di alcune lingue per ottenere chiavi di accesso più pratiche. Sistemi operativi supportati : Windows™ x86 / 64bit
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Foi comprovado que senhas como: datas de nascimento, números de telefone, numero de cartões de crédito... são fáceis de serem descobertas (hackeadas), por isso existe o Password Generator, para gerar senhas que são difíceis de descobrir. O Sistema funciona como um gerador RANDOM, que cria instantaneamente uma série de possibilidades de combinações que o sistema julga ser mais difícil para programas e hackers descobrirem.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Cyber Risk Assessment and Management Platform Icon
    Cyber Risk Assessment and Management Platform

    ConnectWise Identify is a powerful cybersecurity risk assessment platform offering strategic cybersecurity assessments and recommendations.

    When it comes to cybersecurity, what your clients don’t know can really hurt them. And believe it or not, keep them safe starts with asking questions. With ConnectWise Identify Assessment, get access to risk assessment backed by the NIST Cybersecurity Framework to uncover risks across your client’s entire business, not just their networks. With a clearly defined, easy-to-read risk report in hand, you can start having meaningful security conversations that can get you on the path of keeping your clients protected from every angle. Choose from two assessment levels to cover every client’s need, from the Essentials to cover the basics to our Comprehensive Assessment to dive deeper to uncover additional risks. Our intuitive heat map shows you your client’s overall risk level and priority to address risks based on probability and financial impact. Each report includes remediation recommendations to help you create a revenue-generating action plan.
  • 5

    S-Log

    Um software de monitoramento (Controle parental) simples e eficiente!

    S-Log é um programa desenvolvido por Renan Cavalieri (Tec Dicas) com código fonte aberto, o programa tem o objetivo de monitorar tudo que foi digitado no teclado, útil para país descobrirem conversas ou comportamentos estranhos de seus filhos que navegam na Internet. A ferramenta é desenvolvida como base um Keylogger, porem não é um vírus (confira o código fonte caso tenha dúvidas), pois funciona de forma controlada e totalmente invisível ao usuário final, utilizando somente o modo offline...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next