SiteDocs is a digital safety management software used to support work site compliance.
Ideally designed for business that deals with Construction, Oil & Gas, Mining, Manufacturing, Mechanical, Electrical, Plumbing, Heating, and Excavating, SiteDocs is a perfect solution for any size business looking to modernize the way Safety Compliance is organized.
Learn More
Fully managed relational database service for MySQL, PostgreSQL, and SQL Server
Focus on your application, and leave the database to us
Cloud SQL manages your databases so you don't have to, so your business can run without disruption. It automates all your backups, replication, patches, encryption, and storage capacity increases to give your applications the reliability, scalability, and security they need.
Read and search The Holy Bible with this easy to use offline app.
...Comes complete with these 11 built-in public domain bibles
* (AKJV) American King James Version
* (ASV) American Standard Version
* (BSB) Berean Standard Bible
* (CPDV) Catholic Public Domain Version
* (DBT) Darby Bible Translation
* (DRB) Douay-Rheims Bible
* (ERV) English Revised Version
* (KJV) King James Bible - Pure Cambridge Edition
* (OKJV) King James Bible 1611
* (WBT) Webster Bible Translation
* (WEB) World English Bible
The Doc2Html command line operating program strippes the Word produced html files (by opening the documet, saving as html) leaving pure text + minimum html code. It also has a mode to convert data berween different charsets: DOS, Windows-1250 and ISO-8859
Very small utilities that encode/decodes files into/from base64 respectively. Completely written in Pure Pascal (from version 2) they should compile in every Pascal compiler known to man.
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.