Supercharge Your Manufacturing with Easy MRP and MES Software
Designed for SME manufacturers who want to reduce wasteful manual processing, save time and increase profits.
Flowlens eliminates stock-outs, shortage and overstocks, avoiding costly production delays.
Stay in control of inventory levels and keep production running smoothly with real-time visibility and easy-to-use stock management. Import bulk data with ease.
Learn More
Secure User Management, Made Simple | Frontegg
Get 7,500 MAUs, 50 tenants, and 5 SSOs free – integrated into your app with just a few lines of code.
Frontegg powers modern businesses with a user management platform that’s fast to deploy and built to scale. Embed SSO, multi-tenancy, and a customer-facing admin portal using robust SDKs and APIs – no complex setup required. Designed for the Product-Led Growth era, it simplifies setup, secures your users, and frees your team to innovate. From startups to enterprises, Frontegg delivers enterprise-grade tools at zero cost to start. Kick off today.
Detritus is a package of programs for aiding power users or systems administrators in finding, and as needed trimming or deleting, the variety of useless files that Windows accumulates, such as tmps, caches, logs, . . . that the MS Disk Cleanup misses.
Visual MIB Browser that supports getting the MIB from RFC, managing the MIB, running SNMP operations (v1/v2/v3) with MIB, discovering SNMP devices, graphing MIB variables, visualise MIB as tree, view MIB as UML classes, save MIB data in pdf/xls/text
apGuard is very easy to use program which allows to automatize the process of setting permanent rights for files and directories (using the configuration file). Works on linux, and probably on other UNIX systems.
It is a Uruguayan Linux distribution. Can be used from floppy disks, cdroom or you can install it in your hard disk. It has been designed to be fast and effective without leaving of side the graphical aspect for the user.
Combining the benefits of static and dynamic source code analysis to deliver the most advanced & exhaustive code verification tool.
TrustInSoft Analyzer is a C and C++ source code analyzer powered by formal methods, mathematical & logical reasonings that allow for exhaustive analysis of source code. This analysis can be run without false positives or false negatives, so that every real bug in the code is found. Developers receive several benefits: a user-friendly graphical interface that directs developers to the root cause of bugs, and instant utility to expand the coverage of their existing tests. Unlike traditional source code analysis tools, TrustInSoft’s solution is not only the most comprehensive approach on the market but is also progressive, instantly deployable by developers, even if they lack experience with formal methods, from exhaustive analysis up to a functional proof that the software developed meets specifications.
CMage provides the ability to create an image of a filesystem on an IDE/SATA device and apply the image to a second hard drive of either IDE or SATA with a smaller, equal, or larger device size. CMage is run from a linux based liveCD on the terminal.
cpm is a small console tool to manage passwords and store them public key encrypted in a file - even for more than one person.
The encryption is handled via GnuPG so you can access the programs data via gpg as well.
PAM module which will authenticate user by X509 certificates. Keys must be provided in some automountable location. As storage may be used usb steaks, bluetooth storage devices... Mainly intended for password-less authentication on single user clients pc
UberImaging centrally controls the disk imaging process of many nodes on a network. Clients booted via PXE are served a small initrd image containing udpcast, a client module, and other tools allowing clients to be remotely controlled by a portable GUI.
Build innovative business apps powered by process automation
Connect workflows, teams and systems within one digital business transformation platform
Manage your business as a unified system of interacting processes. Use BPMN 2.0 for low-code process modeling by business people. Follow your strategic goals with process architecture that always corresponds to the structure of an actual business.
TuxGuardian is an application-based firewall with a graphical interface. It's main task is to control and forbid transmission & reception of data by unauthorized applications; it can be thought as the Linux equivalent to apps such as ZoneAlarm and Kerio
Knoppix-based live linux .ISO will perform all the tasks required in a typical asset recovery process for PCs. Includes DOD data removal. Used for HIPAA, Sarbanes-Oxley, and FACTA data disposal regs. Data removal protects privacy and identity theft.
Universal login-script processor for windows NT, W2K, XP which does'nt require the workstation beeing a member of the windows-domain or active directory. Please find more Files and Doku at the Project-Homepage.
'finddouble' application searches into a directory and all its sub directories.
If it finds several times the same file, a warning message is displayed, but no other action is taken.
It's main use is to help you optimize you disk usage.
A package manager for Slackware Linux. Install and uppdate trought FTP, HTTP... Choose between current or release. Search for files in packages, Serach with wildcards. Use blacklist. Detect root, and switch to only download packages. Checks md5s and deps
Trivially Distributed File System is a FUSE-based file system module that enables single-writer-multiple-reader distribution/clustering of file system data.
yafic is Yet Another File Integrity Checker, similar to Tripwire. yafic, however, is fast, simple, and yet flexible. Config files are similar to Tripwire's, even supporting flag templates. It uses SHA-1 as its hash function.
A suite of three programs: dosunix: converts DOS text files to Unix text files;
unixdos: converts Unix text files to DOS text files;
chktxt: inspects a given file and determines whether it
is in DOS or Unix text format (the common command
'file' retur
...It provides a means by which a user may control the task queue on a remote computer. The system is flexible and easy to use, configure, and install. It includes secure data transfers.
XSServer is a system, which is intented to be an easy way to configure dhcp, iptables and squid in order to make possible to have those working together at once, generating the needed config files for each.
Set of tools needed to setup and maintain encrypted partitions under unix systems (initially linux). Especially helpfull when doing root device encryption. Features xml configuration, multiple users, usb "tokens" (usb mass storage) and key hierarchy.
Extends the Name Service Switch (NSS) API, enabling superior integration with network databases. Various sources, such as MySQL, extend naming services such as /etc/passwd - allowing for better data management and single sign-on capabilities.
A backup/transfer files program to move and process files between computers in a production (industrial) process. The processing of file begins when it are created or copied to directory and they can be redirected to other machine to be used.
xml-HTB is a tool for automatic generation of bash scripts that sets up HTB on Linux. It uses xml configuration files. It's easy to use, It have a lot of features: multiple depths of classes, configurable leaf, u32 and fw filters, configure both input a