Showing 13 open source projects for "secure boot"

View related business solutions
  • Case Management Software for Social Services Icon
    Case Management Software for Social Services

    For human services organizations looking for case management software

    Collaborate is customizable case management software for non-profits and social services agencies with teams of 5+ staff.
  • Create state-of-the-art conversational agents with Google AI Icon
    Create state-of-the-art conversational agents with Google AI

    Using Dialogflow, you can provide new and engaging ways for users to interact with your product.

    Dialogflow can analyze multiple types of input from your customers, including text or audio inputs (like from a phone or voice recording). It can also respond to your customers in a couple of ways, either through text or with synthetic speech. Dialogflow CX and ES provide virtual agent services for chatbots and contact centers. If you have a contact center that employs human agents, you can use Agent Assist to help your human agents. Agent Assist provides real-time suggestions for human agents while they are in conversations with end-user customers.
  • 1
    nwipe

    nwipe

    nwipe secure disk eraser

    nwipe is a fork of the dwipe command originally used by Darik's Boot and Nuke (DBAN). nwipe was created out of a need to run the DBAN dwipe command outside of DBAN, in order to allow its use with any host distribution, thus giving better hardware support. nwipe is a program that will securely erase the entire contents of disks. It can wipe a single drive or multiple disks simultaneously. It can operate as both a command line tool without a GUI or with a ncurses GUI.
    Downloads: 35 This Week
    Last Update:
    See Project
  • 2
    WinDiskWriter

    WinDiskWriter

    Windows Bootable USB creator for macOS

    Windows USB disk creator for macOS. You can use this app to create bootable universal USB Windows installers that support both UEFI and Legacy BIOS modes. With this USB drive, you can install and enjoy Windows on your PC, Intel Mac, or certain Virtual Machines. WinDiskWriter knows how to make a bootable drive for each Windows Image type. You can bypass TPM, Minimum RAM, Secure Boot, and some other System Requirements set by Microsoft for Windows 11. You can create an all-in-one USB drive...
    Downloads: 12 This Week
    Last Update:
    See Project
  • 3
    Ventoy

    Ventoy

    A New Bootable USB Solution

    Ventoy is an open source tool to create bootable USB drive for ISO/WIM/IMG/VHD(x)/EFI files. With Ventoy, you don't need to format the disk over and over, you just need to copy the ISO/WIM/IMG/VHD(x)/EFI files to the USB drive and boot them directly. You can copy many files at a time and Ventoy will give you a boot menu to select them. You can also browse ISO/WIM/IMG/VHD(x)/EFI files in local disks and boot them. x86 Legacy BIOS, IA32 UEFI, x86_64 UEFI, ARM64 UEFI and MIPS64EL UEFI...
    Leader badge
    Downloads: 128,307 This Week
    Last Update:
    See Project
  • 4
    rEFInd

    rEFInd

    An EFI boot manager utility

    rEFInd is a fork of the rEFIt boot manager. Like rEFIt, rEFInd can auto-detect your installed EFI boot loaders and it presents a pretty GUI menu of boot options. rEFInd goes beyond rEFIt in that rEFInd better handles systems with many boot loaders, gives better control over the boot loader search process, and provides the ability for users to define their own boot loader entries.
    Leader badge
    Downloads: 4,782 This Week
    Last Update:
    See Project
  • Cyber Risk Assessment and Management Platform Icon
    Cyber Risk Assessment and Management Platform

    ConnectWise Identify is a powerful cybersecurity risk assessment platform offering strategic cybersecurity assessments and recommendations.

    When it comes to cybersecurity, what your clients don’t know can really hurt them. And believe it or not, keep them safe starts with asking questions. With ConnectWise Identify Assessment, get access to risk assessment backed by the NIST Cybersecurity Framework to uncover risks across your client’s entire business, not just their networks. With a clearly defined, easy-to-read risk report in hand, you can start having meaningful security conversations that can get you on the path of keeping your clients protected from every angle. Choose from two assessment levels to cover every client’s need, from the Essentials to cover the basics to our Comprehensive Assessment to dive deeper to uncover additional risks. Our intuitive heat map shows you your client’s overall risk level and priority to address risks based on probability and financial impact. Each report includes remediation recommendations to help you create a revenue-generating action plan.
  • 5
    WinDiskWriter

    WinDiskWriter

    🖥 A macOS app that creates bootable USB drives for Windows. 🛠

    ⭐️ WinDiskWriter — bootable disk creator with Windows for macOS. ⭐️ 🚨 Supports Windows 11 Secure Boot and TPM patching 🚨 - Runs on Mac OS X Snow Leopard 10.6 and up - Supports the following versions of Microsoft Windows 💿: — Windows 11, — Windows 10, — Windows 8.1, — Windows 8, — Windows 7, — Windows Vista [ Including Windows Server editions ] 🖥 WinDiskWriter offers a user-friendly graphical interface that simplifies the process and guides you through the steps...
    Downloads: 192 This Week
    Last Update:
    See Project
  • 6
    fast single-privilege single-address-space preemptive-multithreading persistent data-centric secure multiuser operating system with safe-language and reconfigurable graphical interface
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    USE secure operating system

    USE secure operating system

    a secure, open source OS for use inside USEagency facilities

    ... and signature-based virus scan. After that, they will be placed in a leveled security storage space, each more secure--with the most secure being 50. Under 50 will be 46-49; under that is 36-45; under that is 27-25; under that is 26; under that is 14-25; under that is 6-13; under that is 5-3; lastly there is level 2 the most insecure. The operating system itself will require many passwords: boot up, access logon screen, login, admin, and more/ Mainly, it will be built with strong security as its base
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    Linux-cfyffe fork

    A custom fork of the Linux kernel.

    This kernel is for x86_64 only. If you want to reconfigure it for x86, feel free to, but I'm not going to as I only have x86_64 hardware. This will never leave BETA status as it's usually total chaos about how releases are handled, features may appear and disappear faster than you can blink. The only thing I can promise about the kernels I upload is that if I upload it, it built, installed, and booted on my personal system without a problem. I use LUKS and LVM for everything but /boot, so...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    TrustedGRUB extends the GRUB bootloader with TCG support. This makes it possible to provide a secure bootstrap architecture. The whole boot process is measured and - by support of a Trusted Platform Module (TPM) - the system integrity is verifyable.
    Downloads: 6 This Week
    Last Update:
    See Project
  • RMM Software | Remote Monitoring Platform and Tools Icon
    RMM Software | Remote Monitoring Platform and Tools

    Best-in-class automation, scalability, and single-pane IT management.

    Don’t settle when it comes to managing your clients’ IT infrastructure. Exceed their expectations with ConnectWise RMM, our MSP RMM software that provides proactive tools and NOC services—regardless of device environment. With the number of new vulnerabilities rising each year, smart patching procedures have never been more important. We automatically test and deploy patches when they are viable and restrict patches that are harmful. Get better protection for clients while you spend less time managing endpoints and more time growing your business. It’s tough to locate, afford, and retain quality talent. In fact, 81% of IT leaders say it’s hard to find the recruits they need. Add ConnectWise RMM, NOC services and get the expertise and problem resolution you need to become the advisor your clients demand—without adding headcount.
  • 10
    Eselstall Secure Environment to Launch Software you don't Trust At aLL: Combined chroot/setuid tool to easily launch background processes (servers) in a confined environment. Eliminates the need for su in the changeroot directory.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    POSYS: Programmers Operating SYStem. A small, fast, dynamic, secure OS project. (In development) Language: NASM + CC386.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    ncurOS is a very secure OS, which is based on an UNIX (maybe linux) kernel. Many system tools are integrated in the kernel. All of these tools are written with ncurses. All ncurOS-developers follow a coding standard.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    rcstagger

    secure network aware process monitoring system

    rcstagger is a network aware process monitoring system designed to work alongside the init process (Note that it makes no attempt to replace init). It utilizes openssl to maintain PKI authentication to verify the identify of sibling daemons and any control clients.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next