Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.
Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
Download Free Tool
AI-generated apps that pass security review
Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.
Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
Policy engine and reporting tool for large file systems. It maintains a replicate of filesystem medatada in a database that can be queried at will. It makes it possible to schedule mass action on filesystem entries by defining attribute-based policies, provides fast 'find' and 'du' enhanced clones, gives to administrators an overall view of filesystem contents through its web UI and command line tools.
It supports any POSIX filesystem and implements advanced features for Lustre filesystems...
ng‑token‑auth is an AngularJS module that provides token-based authentication for single-page applications by coordinating with server-side token systems like the devise_token_auth gem. Oauth2 authentication. Email authentication, including user registration. Password reset, account updates, account deletion, seamless integration with the devise token auth Rails gem, and extensive event notifications. This module relies on token based authentication. This requires coordination between the...
The WiKID Strong Authentication System is a public-key based two-factor authentication system. It is a flexible, extensible, and secure alternative to tokens, certs and passwords. Application & API support exists for Java, ASP, PHP, Ruby, OpenVPN, TACACS+, etc.
Read our eGuide on how to setup your network with two-factor authentication: http://www.wikidsystems.com/learn-more/two-factor-authentication-white-papers
Set limits on per-day total usage for Linux/Unix users
pam_duration provides a module for the Pluggable Authentication Module (PAM) authorization framework that sets per-day limits on total usage by particular Linux/Unix users on a single system. Limits can be configured by day of the week, so, for example, weekend limits can be different from weekdays.
It also provides a service to ensure logout when the specified time limit expires.
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
The DDoS Attack Defender Tool is a simple, yet effective python script that defends your linux system against a distributed denial of service (DDoS) attack by limiting the number of connections per IP Address.
Create and administrate new virtual hosts in a apache/fastcgi/suexec-environment based on a tutorial found in web (see in-file notes). This shell-script makes it easier to administrate all steps which are necessary in a fastcgi/suexec-environment
WinPatchMgmt will use Microsoft's MBSA and office inventory tools to generate scripts for updating windows clients for OS and all supported office versions. Later versions will integrate with Winventory or open-audIT (winventory.sourceforge.net).
Perl cgi for virtual users/virtual domain for exim and tpop3d management. White/black lists per user/domain, quota, etc. No any db, all data stored in plain-text files. Exim, tpop3d and apache config included. Intend for small (10-100 users) mail system.
Secure and customizable compute service that lets you create and run virtual machines.
Computing infrastructure in predefined or custom machine sizes to accelerate your cloud transformation. General purpose (E2, N1, N2, N2D) machines provide a good balance of price and performance. Compute optimized (C2) machines offer high-end vCPU performance for compute-intensive workloads. Memory optimized (M2) machines offer the highest memory and are great for in-memory databases. Accelerator optimized (A2) machines are based on the A100 GPU, for very demanding applications.
LdapCyradm is a management tool that allows admin and help desk staff to easily do day to day management of an LDAP backed Cyrus imap system. It also integrates the management of the SquirrelMail plugin AmavisNewSQL for per user w/b lists and quarantine
A simple Python script for Gentoo Linux that searches for packages compiled with selected cflags and recompiles them. (Piccolo script in Python per Gentoo Linux che cerca i pacchetti compilati con determinate cflags e li ricompila)
This small project fills a need for network administrators to centralize their SSH keys management. It allows to manage a database of public keys via a GUI (and an upcoming command line interface), dinamically enabiling on a per-key, per-user and per-host
ZorbIPtraffic shows the IP traffic on a network interface in real time. It can display traffic statistics for each IP on your internal network, and it summarizes the total traffic for each IP per year, per month, and per day.
Squidalyser is a squid traffic analyser, to allow per-user scrutiny of squid logfiles. It provides information about web usage patterns, the type of information downloaded, websites visited, graphics downloaded, and number of bytes or files downloaded.
A daemon that provides a method to track generic POP3 or IMAP logins and then email (in future:also block) the user if they exceed the number of accesses per given minutes allowed.
rcf is an ipchains-based firewall with support for over 50 protocols, masquerading, portforwarding, IP accounting and various protections. Unlimited public, private, DMZ and MZ interfaces are supported. Rules are defined per interface and DMZ/MZ clusters.
Noid is a system for controlling the environment of individual processes in a Unix system. Today, it can provide per-process namespaces and disable suid/sgid under Linux 2.4. This project has moved. See the homepage for information, file releases and news