Empower Your Workforce and Digitize Your Shop Floor
Benefits to Manufacturers
Easily connect to most tools and equipment on the shop floor, enabling efficient data collection and boosting productivity with vital insights. Turn information into action to generate new ideas and better processes.
Learn More
Powering the next decade of business messaging | Twilio MessagingX
For organizations interested programmable APIs built on a scalable business messaging platform
Build unique experiences across SMS, MMS, Facebook Messenger, and WhatsApp – with our unified messaging APIs.
A C library with support for logging, configuration, networking, message specification, semaphores, message queues, SSL, timing, epoll and email functionality.
SD4L is a suite of Linux tools including a graphical user interface which allow the creation of, and access to ScramDisk as well as TrueCrypt encrypted container files. In particular, SD4L provides a Linux driver which enables mounting of containers.
Combining the benefits of static and dynamic source code analysis to deliver the most advanced & exhaustive code verification tool.
TrustInSoft Analyzer is a C and C++ source code analyzer powered by formal methods, mathematical & logical reasonings that allow for exhaustive analysis of source code. This analysis can be run without false positives or false negatives, so that every real bug in the code is found. Developers receive several benefits: a user-friendly graphical interface that directs developers to the root cause of bugs, and instant utility to expand the coverage of their existing tests. Unlike traditional source code analysis tools, TrustInSoft’s solution is not only the most comprehensive approach on the market but is also progressive, instantly deployable by developers, even if they lack experience with formal methods, from exhaustive analysis up to a functional proof that the software developed meets specifications.
A set of tools for querying and modifying the ACL's (access control lists) and ACE's (access control entries) of files, services, registry keys, printers, processes, threads, timers, mutexes, tokens, events, and semaphores in Windows 2000 and later
A program that encrypts multiple files. It uses new encryption algorithms, such as a Three-Block Feistel chiper, ArchFurry's algorithm and a new hash function. Licensed under the ISC.
cst allows to split (or share) "secret" files, like private keys, into number of equal parts. After that, secret can only be recovered by collecting all parts together. If any of this parts is lost, the secret is lost too.
You can turn your USB sticks and even your removable hard disks into a portable safe and securely carry your all sensitive data or work. The USBK protects your privacy. www.usb-k.com
Teams of all sizes and in various industries that want the best time tracking and employee monitoring solution.
It's easy with Hubstaff, a time-tracking and workforce management platform that automates almost every aspect of running or growing a business. Teams can track time to projects and to-dos using Hubstaff's desktop, web, or mobile applications. You'll be able to see how much time your team spends on different tasks, plus productivity metrics like activity rates and app usage through Hubstaff's online dashboard. Most of the available features are customizable on a per-user basis, so you can create the team management tool you need.
Device driver to enable the TPM chip as described by specifications at http://www.trustedcomputinggroup.org.
The TPM chip will enable you to use hardware to securely store and protect your keys and personal data. See also theTrouSers project.
This driver is integrated into the mainline Linux Kernel - code downloads on this page are only for historical reasons.
Latest Code can be found at:
https://github.com/PeterHuewe/linux-tpmdd
Patchwork:
https://patchwork.ozlabs.org/project/tpmdd/list/
This program is used as a tool to check for ASCII code and strip it out to a new file to recover documents that got corrupted or find hidden data in viruses that contain text by the virus writer or spies puting comments in images or other files.
Expand a TrueCrypt volume on the fly without reformatting. All kind of volumes (container files, disks and partitions) formatted with the NTFS file system are supported.
Anoubis is a Security Suite which implements a secured environment for applications. The core of the suite is an Application Firewall alongside with a Sandbox. Mechanisms to assure the authenticity of files, directories and applications are provided.
The System for Modular Analysis and Continuous Queries (SMACQ) is a modular platform for analyzing and querying large datasets, including streaming network data, using features from databases, UNIX pipelines, and modular intrusion detection systems.
PalmSecure (pSecure for short) is the opensource adaptation of the discontinued Toysoft program, SecureX. The source rights were purchased from them, and, after meeting their conditions, it was made free for everyone to use. Please use it!!!!
SteGUI is a graphical front-end to Steghide. It lets users view the images and play the sounds that Steghide allows as cover files, and command the program all with one tool. It also embeds a simple text editor to manage text payload files.
yaSSL, or yet another SSL, is an embedded ssl library for programmers building security functionality into their applications and devices. yaSSL is highly portable, and runs on standard as well as embedded platforms(QNX, ThreadX, VxWorks, Tron)
yaSSL is still available but no longer being developed. Current development on the same project continues under wolfSSL. Visit yaSSL Home above for the latest stable release.
Simple tool for file encryption and folder content encryption with AES 256. Files can also be hashed with a SHA1 signature. A command line version is available as well as a GUI version. One other useful feature is to encrypt messages for emails.
This is a more secure file encryption program which uses SERPENT cipher and WHIRLPOOL+SHA-256 hash functions in key creation and for integrity checking.
Stores and retrieves files in an encrypted archive. Also manages files stored on CDs and DVDs. Other functions are incomplete. PLEASE NOTE: you need to download both an Objectify release and a Public Objects release.
Cryptic is a cryptographic applications suite for encryption/decryption of data, calculating cryptographic hashes or message digests and securing user passwords using a master password in a password safe.
Ourmon is a network monitoring and anomaly detection system and displays the data for multiple BPF expressions via RRDTOOL-based graphs. It also helps the user identify various kinds of network anomalies using various flow analysis tools and logging.
TclTrf is an extension library to the script language tcl, as created by John Ousterhout. It extends the language at the C-and Tcl-with ``transformer''-commands to encode and compress data.
Based on the stacked channels of the tcl core (ability inter