Achieve harmony across your Apple device fleet with Kandji's unmatched management and security capabilities.
Learn More
Atera IT Autopilot
Ensure operational efficiency at any scale with 24/7 autonomous IT support.
IT Autopilot takes the pressure off your team by handling first-tier support across the channels your end users already live in — email, chat, Slack, Teams, and your Customer Portal. It doesn’t just respond to end-user queries, issues, and crises — it solves them.
Standalone chat system developed in php, mysql and javascript
phpMyChat-Plus is an easy-to-install, easy-to-use multi-room PHP/DB chat. It is currently available for MySQLi, MariaDB, PostgreSQL, and ODBC. It supports IRC-like commands, moderators, is available in 24 languages and fully compatible with php7.
Plugin for ChatZilla which monitors torrent IRC announce channels, downloads torrent files based on a user-defined filter, and then sends the torrent files to a local or remote torrent client. Supports several different private trackers.
AutoHome(Automatic Home Management System) to schedule Television,DVD,and any Infrared based devices(Roboraptor and RoboSapien)to work automatically.Can Send(transmit)/Recieve Remote Control Signals, launch EXE files in Computers/PC .It uses USBUIRT.
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.