Statseeker is a powerful network performance monitoring solution for businesses
Using just a single server or virtual machine, Statseeker can be up and running within minutes, and discovering your entire network in less than an hour, without any significant effect on your bandwidth availability.
Learn More
Attack Surface Management | Criminal IP ASM
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
The GNAVI project provides GWindows, a Rapid Application Development framework for Graphical User Interfaces on MS Windows.
The durable Open Source answer to Delphi and Visual Basic.
Alire crate: https://alire.ada.dev/crates/gwindows
Mirror: https://github.com/zertovitch/gwindows
We humans are bound by intellectual abilities. All knowledge is far beyond power of any person. The only way to apply knowledge is to build machines able to present it human way but not limited by volume.
Intellect Modeling Kit (IMK) is intended to build knowledge machines (KM) assisting experts on the steps of activity:
* Observation;
* Producing propositions based on knowledge;
* Elimination of impossible propositions;
* Selection and verification of the most appropriate...
HeidiSQL is a useful and reliable tool designed for web developers using the popular MySQL server, Microsoft SQL databases and PostgreSQL.
Code repository and tickets have moved to https://github.com/HeidiSQL/HeidiSQL in Nov 2017.
Manage permissions/restritions on Firebird Database, focus on Role or User. You can use it to extract meta-data (DDL script format) to recreate some objects and object permissions.
Jesta I.S. | Enterprise Software For Retail and Supply Chain
Transition from fragmented entry-level or legacy systems to an enterprise suite.
Unify your people and operations across all departments and channels. Discover end-to-end retail, wholesale, and supply chain management software suites designed to scale.
Thokbook is a personal library system, written in perl. It is intended for medium to large individual collections (several thousand books). Using thokbook, you will be able to add books via ISBN or EAN (usually via a barcode scanner of some kind), get