Sage Intacct Cloud Accounting and Financial Management Software
Cloud accounting, payroll, and HR that grows with you
Drive your organization forward with the right solution at the right price. AI-powered continuous accounting and ERP to support your growth now and into the future.
Learn More
Attack Surface Management | Criminal IP ASM
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
Free OMR - OCR web sofware based on javascript and PHP
...Once you have parameterized your form, you can print many of them, give it to your students/respondents, scan and recognize them with formread, and you can finally export the data in your preferred formats (excel, pdf, csv)
It can be used to add or edit EXIF2.2 tags to existing JPEG image files. It is particularly useful in storing the exposure details for a photo scanned out of films. It is now a stand alone application implemented in PHP-GTK. Just unzip the release packag
phpMount is a webinterface for mount, unmounting and maintaining devices attached to a Linux-computer. This interfaces gives you the possiblity to download and upload files from the devices, get device-information and maintain a log of all actions.