Striven is an all-in-one business management software suite with everything your organization needs for success.
Striven is the all-in-one business management software that lowers your costs, improves your operations, and makes work easier. Make your company’s data coherent, connected, and relevant.
Learn More
Hightouch is a data and AI platform for marketing and personalization.
Marketing needs data and AI. Give them Hightouch.
Find insights, run real-time campaigns, and build AI agents with all your data.
Knowngoods Report Generator is a set of shell scripts and a Makefile which generate plain text reports about modified files on your system. It does this by the use of checksum reference files which can be found at http://www.knowngoods.org/download.html f
A Secure, Firewall-Friendly Platform for Peer-to-Peer Networking.
With a few mouse clicks, request remote access to colleagues' computer desktops, transfer files, sketch & chat, or videoconference. Automatic, authenticated & encrypted tunneling!
Regular Expression, Arbitrary Protocol, Opensource Filtering Firewall (Reapoff) is a regular expression enabled TCP/IP plug proxy.
The proxy operates on data using a pair of simple rule based configuration files defining the testing and actions on th
Wonder who deleted that important file on your Linux box? Did your database files "mysteriously" disappear from that super-secure Linux database server and you don't know how? Now your system logs will tell who, what, when, and how with Auditunlink
Haystack is a modern, engaging, and intuitive intranet platform that employees actually use.
You Deserve the Best Intranet Experience
With customizable iOS and Android mobile apps, Slack and Microsoft Teams integrations, and an intuitive design employees love, Haystack brings an outstanding digital employee experience to your entire workforce, no matter where their work takes them.
The File Shredder securely shreds files by overwriting them before they are deleted. Every character in the file is overwritten with customised random data, so it is secure, but a little slow. The file is also given a random name.
ThorsenCode is a client-server system, that allows you and your buddies to share files in a safe way. It features encrypted filetransfers and encrypted chatrooms.
This very simple perl script parses you iptables log files and produces a report in text format with a summary based on the prefix of the log ( --log-prefix option of iptables ).
Prefix description is allowed.
RG-Safe uses the Cryptlib library to keep all your information "safe". You can import files into your SAFE. From there you can securly view it, reencrypt it, export it or email it securly to someone on your keyring. You can sign/check files & also comat
[ Phrozen ] is a freeware/opensource (as in GNU) PHP encoder written in PHP it is entirely contained within this one file. The idea is that you can encode files through the interface. Phrozen also has PHAT functions which act as a file allocation table.
Synerion offers time and labor, advanced scheduling, absence management, labor allocation, timesheets, coreHR and more.
Stop wasting time and resources on manual and error-prone paper-based workforce management with Synerion. Synerion offers a comprehensive range of workforce management solutions that goes beyond time and tracking. The platform also offers enhanced scheduling features, labor costing, absence management, and payroll integration.
Hardware-ID is a small Linux module providing
a program by program assignment of certain hardware
specific values. Useful for preparing master
hard drives, hardware independend backup/restore
and some exotic hardware.
...Has many features which are non-existant in other OTP programs, and includes 5 programs (plus an uninstaller) which allow the user to create keys, create fake keys, encrypt, and decrypt files.
bcrypt is a lightweight blowfish file encryption utility which aims for cross-platform portability of not only the actual code, but the encrypted files as well. In addition to providing 448-bit encryption, bcrypt overwrites input files with random garbage
ProSum is a terminal based program that protects your files, sys_call_table and IDT like tripwire way (All in user space, without kernel modules) In addition, database with files etc. could be encrypted with Blowfish algorythm and more.
SyncShare Server is a secure messaging and real-time collaboration
platform. Build solutions to connect people, data, and applications through
firewalls and mobile devices. It handles all networking, security issues and lets
one focus on the business
An Experimental Platform for Secure Peer Services, QARE uses a decentralized trust model, a Public Key Infrastructure and provides single logon for multiple applications running across multiple systems. WAR files are used to add applications.
This program allow you to extract files from network traffic under HTTP and FTP protocols. It should permit you to see, for instance, using an antivirus on the files, if a machine of your network have downloaded a virus.
squirrel net server side script. This script allows users to upload their current ip address to a server so that it can be 'published' and so that anyone can send them data/messages
The Program Killer is a Delphi 6 program that monitors the Process List on Windows 95/98/Me and Windows NT4/2000/XP for unauthorized EXE files (User Definable) and if found, those Processes are Terminated via the Windows API.
This project is intended to provide a means by which one can insert data other than packet data into the snort/ACID IDS system.
We have scrapped the perl version - since some systems don't have perl - or don't have the ram, cpu or diskspace to run the ho
This project is a Linux-PAM module designed for mounting a user's encrypted,
home directory using the user's login credentials as the decryption key. The
module also unmounts the user's home directory at logout to re-encrypt the protected data.
A password manager that is able to encript data in various algorithms and store them in file, database, ...
It is written in 100% pure Java using only Java technology.
The Linux Transparent Encryption project aims for integrating transparent read/write access to encrypted data into the linux
kernel. This enables any application to use encrypted data
without modifying the application itself.