Showing 1 open source project for "vnc portable"

View related business solutions
  • Find out just how much your login box can do for your customer | Auth0 Icon
    Find out just how much your login box can do for your customer | Auth0

    With over 53 social login options, you can fast-track the signup and login experience for users.

    From improving customer experience through seamless sign-on to making MFA as easy as a click of a button – your login box must find the right balance between user convenience, privacy and security.
  • Purchasing and invoice automation solution for small to mid market companies. Icon
    Purchasing and invoice automation solution for small to mid market companies.

    Save your team 10s of hours/week with a fully personalized and automated procurement process.

    ProcureDesk is an integrated purchasing and invoicing platform tailored to help small to medium sized businesses streamline their procurement processes. This user-friendly system automates workflows and consolidates purchasing data into a centralized dashboard, allowing companies to control spending and enhance transparency efficiently. Features like automated invoice matching, simple requisition creation, and immediate cash flow insights minimize manual tasks and boost operational efficiency. ProcureDesk is perfect for smaller enterprises leveraging big-business strategies to reduce costs and optimize their purchasing activities. Discover how ProcureDesk can transform your procurement process into a more effective and manageable part of your business.
  • 1
    IT-Remote Service Tools

    IT-Remote Service Tools

    Manage Remote Connections, RDP, SSH, Mikrotik, VNC

    Manage remote connections for Remote Desktop "RDP" , VNC Viewers, PuTTY , and Mikrotik. Easy to manage connections places, you can add , edit and delete connection place by just one click. IT-Remote Service Tools is secured with password with possibly to turn ON or OFF feature. Configurations file are Extensible Markup Language XML. Password are encypted with symmetric-key encryption that means the string can only be decrypted if the other party has the correct key (which is used...
    Downloads: 3 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next