Define and Deliver Comprehensive Cybersecurity Services. Security threats continue to grow, and your clients are most likely at risk. Small- to medium-sized businesses (SMBs) are targeted by 64% of all cyberattacks, and 62% of them admit lacking in-house expertise to deal with security issues. Now technology solution providers (TSPs) are a prime target. Enter ConnectWise Cybersecurity Management (formerly ConnectWise Fortify) — the advanced cybersecurity solution you need to deliver the managed detection and response protection your clients require. Whether you’re talking to prospects or clients, we provide you with the right insights and data to support your cybersecurity conversation. From client-facing reports to technical guidance, we reduce the noise by guiding you through what’s really needed to demonstrate the value of enhanced strategy.
Your unified business intelligence platform. Self-service. Governed. Embedded.
Chat with your business data with Looker. More than just a modern business intelligence platform, you can turn to Looker for self-service or governed BI, build your own custom applications with trusted metrics, or even bring Looker modeling to your existing BI environment.
Master/node to gather and graph "everything" on your systems using Tobi Oetiker's rrdtool. It can optionally warn your surveillance software. This software package was originally called LRRD. The project. Please see http://munin-monitoring.org/
WANem is a wide area network emulator. It supports various features such a bandwidth limitation, latency, packet loss, network disconnection among other wide area network characteristics.
XMLStarlet is a set of command line utilities (tools) to transform, query, validate, and edit XML documents and files using simple set of shell commands in similar way it is done for text files with UNIX grep, sed, awk, diff, patch, join, etc utilities.
Log File Monitoring - Check Log Files, Analyze, Alert on any UNIX Log
Monitoring log files is mandatory in all UNIX environments. LoGrobot does this for you efficiently. It analyzes, graphs and alerts on system log files, application log files, database log files, custom log files...basically any log file.
Benefits:
Automatically scans log files for errors or user specified patterns
Shows the offending log entries in the alerts generated on a monitored log file
Shows latest size of a log file at the time of the most recent log check
Shows total...
For small and mid-sized businesses that need a comprehensive payroll and HR solution with personalized support
We design our technology to make workforce management easier. APS offers core HR, payroll, benefits administration, attendance, recruiting, employee onboarding, and more.
mp3 library, advanced ID3V1 and ID3V2 tagger, player. Organize a large mp3 library, over 40,000 songs. Speech synthesis and tag backup utilities. Scripts to maintain and organize song files.
gdeptrace dependancy solver correct for pkg or make deps
gdeptrace sorts an input dependancy list or table and prints it, and can do other actions. It's default operation is to act like tsort (1) except that it sorts by pure pkg / make dependancy (tsort sorts by grapical topology: see notes about differences).
EXAMPLE:
$ echo -e "b e\ne\nc b" | sort -k1,1 | gdeptrace [opts]
e
b
c
(b depends on e, c depends on b, e has no depends)
(also: e has more items depending on it and is below anything it depends on; in this case...
dpkglist.awk is a command-line tool for querying available packages on ubuntu and debian systems. It overlaps with the standard apt-cache utility, but, written in simple awk, it is easily extensible, and makes it easy to write one-line scripts.
chainssh is a shell script to smplify the ssh login via multiple sshgateways/firewallgateaways. e.g. connect from homehost via sshgateway to a clusternode with one command.
As your users rely more and more on Cloud and Internet-based technologies, reliable internet connectivity becomes more and more important to your business. With Bigleaf’s proven SD-WAN architecture, groundbreaking AI, and DDoS attack mitigation, you can finally deliver the reliable internet connectivity your business needs without the limitations of traditional networking platforms. Bigleaf’s Cloud Access Network and plug-and-play router allow for limitless control to and from anywhere your traffic needs to go. Bigleaf’s self-driving AI automatically identifies and adapts to any changing circuit conditions and traffic needs—addressing issues before they impact your users. Bigleaf puts you in the driver’s seat of every complaint and support call with full-path traffic and network performance data, delivered as actionable insights, reports, and alerts.
Voswatcher is a tool to collect time correlated performance data on a Solaris or Linux system. This is a tool to gather data before, during, and after an event. It is a set of scripts which makes it suitable for use with sensitive clients.
These three tools build Checkpoint, Cisco ASA or Netscreen policys from logfiles. They write dbedit, access-list or set address, set service and set policy commands for the traffic seen in the logs, that can be cut and pasted into the firewalls. WOOT
LIME (Less-is-More) is parallel/concurrent programming environment based on C. Internally, it uses XML technology to describe tasks and their dependencies. Externally, it offers the ANSI C99 programming as well as a set of visually-oriented interfaces.
Openldapconf is a shell script to install and configure openldap and its dependencies automagically. By now, it includes integration with Samba and Squid. You can make a full installation or configure the packages separated. Powered by Slackware
Plait (pronounced "play") is a command-line jukebox and music player front-end. It understands brief queries that pick a single song, mix queries that combine works from multiple artists, and stream queries that find Shoutcast radio streams.
GTCop Professional Security Appliance aims to provide a powerful tool for satellite communications, with enhanced QoS and bandwidth controls. As derived from IPCop Firewall, it is a stable, secure, easy to configure and maintain GNU/Linux firewall box.
This command-line tool will help people who want to compare 2 csv-like files, and get a detailed report on which rows and fields differ between both files. An awk-based version and Perl Version is currently available.
WESP is a collection of subtle scripts and programs written in several languages (C, /bin/sh, (g)awk, ruby, icon) that breaths a new life into the WEB system for literate programming by Donald Knuth (and CWEB by Knuth/Sylvio Levy).
Jawk is an interpreter/compiler for the AWK programming language for Java. Unlike prior versions, Jawk provides an efficient execution environment for AWK with minimal enhancements to the language.
Provide a plugabble and configurable alternative to UNIX tools like grep, awk, tail, head, cut, sort, uniq or even some perl based scripts in a Java environment. A bit like what Apache Ant means to good old make.