Simplify IT and security with a single endpoint management platform
Automate the hardest parts of IT
NinjaOne automates the hardest parts of IT, delivering visibility, security, and control over all endpoints for more than 20,000 customers.
The NinjaOne automated endpoint management platform is proven to increase productivity, reduce security risk, and lower costs for IT teams and managed service providers. The company seamlessly integrates with a wide range of IT and security technologies. NinjaOne is obsessed with customer success and provides free and unlimited onboarding, training, and support.
Learn More
Your top-rated shield against malware and online scams | Avast Free Antivirus
Browse and email in peace, supported by clever AI
Our antivirus software scans for security and performance issues and helps you to fix them instantly. It also protects you in real time by analyzing unknown files before they reach your desktop PC or laptop — all for free.
headsort: streaming sort + 2x faster than gnu sort
headsort sorts files by line and fields. Options can pick field order and etc.
In general headsort can sort in 1/2 the time sort(1) (mergesort) does in situations involving either pipes or mult column selection; less than 1/2 with both. Best case was about opposite that of sort(1)*.
NEW* hsort main algorithm speed improvement (applies to all; 27,29,31). Now faster than sort(1) (in all cases tested).
Using triangulation, hsort begins piped sorted output when 1st bin is done...
Simple WAN Simulator (simWANsim) is a SIMPLE WAN simulator that configures specific network intefaces in order to simulate high-latency networks typical in WAN setups.
rrd-watcher is an intelligent alerting system that detects and alerts on abnormal data found in RRD files. Alerts can be raised by using the rrdtool Holt-Winters forecasting method, or with the rrd-watcher detection algorithm.
sha is a file hashing utility that uses the NIST's SHA-1, SHA-256, SHA-384, & SHA-512 hash algorithms. It can be used for file integrity checking, remote file comparisons, etc. The portable algorithm implementations can be useful in other projects too.
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
A similar to Tripwire, file system integrity checking tool but develop in java and cross platform.
This tools checking and source control using check sum algorithm like MD5, SHA and CRC.