A privacy-first API that predicts global consumer preferences
Qloo AI adds value to a wide range of Fortune 500 companies in the media, technology, CPG, hospitality, and automotive sectors.
Through our API, we provide contextualized personalization and insights based on a deep understanding of consumer behavior and more than 575 million people, places, and things.
Learn More
Attack Surface Management | Criminal IP ASM
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
A simple yet powerful Syslog protocol Server & Analyzer. Can be tuned to only log events under a threshold, or to directly mail and admin when another threshold value is reached. The events can be viewed by hosts, by severity, or by facility.
It can't be used as a service from Windows Server 2008 and newer due to their different security policy.
This is a remote admin app for Windows that gathers live info via WMI. No installation required. Visit http://lazyadmin.sourceforge.net/ for latest info, screenshots and details. Send feedback! ;)
You are looking for to delete the cached password stored by CVSNT in the registry editor ??, This is your solution !!, this is a Registry Monitor designed for this, monitor a registry key and delete it after a configurable time.
Sniper is a powerful keylogger component that can be easily integrated in applications. It is a small,easy-to-use ActiveX control that encapsulates all the complexity for logging keys and exposes a few important properties and methods.
The modern employee engagement platform for the modern workforce
Create a positive and energetic workplace environment with Motivosity, an innovative employee recognition and engagement platform. With Motivosity, employees can give each other small monetary bonuses for doing great things, promoting trust, collaboration, and appreciation in the workplace. The software solution comes with features such as an open-currency open-reward system, insights and analytics, dynamic organization chart, award programs, milestones, and more.
Connects to Active Directory and retrieves a list of computer objects, queries for FSMO roles, and then connects to computer objects and queries for inventory information, outputting results to .csv file.
A collection of Windows script files for system administration purposes, including waRmZip: delete/compress old files, waTimer: stopwatch program with statistics, waGetOpts: option parser for .cmd, waTee: copy STDIN to a file
Log4Domino is a log framework that enables easy logging of Java and LotusScript code in a Lotus Notes/Domino environment. The package is partially built on Apache\'s log4j as the Java part is a direct extension of log4j specialized to the Domino enviro
The Winfessor Enhanced .NET Trace Library is written in VB.NET, supports class level configuration, and contains both console and Winforms trace receiver interfaces. To use it you simply put a Traceable attribute on your class and call a static method.
Workspace management made easy, fast and affordable.
For companies searching for a desk booking software for safe and flexible working
The way we work has changed and Clearooms puts you in complete control of your hybrid workspace. Both meeting rooms and hot desk booking can be easily managed to ensure flexible and safe working, however big or small your organisation.
daddyQ, written in Python, monitors and logs disk usage on file servers, and take actions on excessive disk usage. Users that are often over their quota or are over the quota with excessive disk usage get their files deleted.
**CANCELLED**
Guard Goose is a utility that will reside in your system tray, and monitor shell events (watch only certain events if user wants) including app install/uninstall,file system events. It will output such to a log and display in a listview
This is a collection of polymorphic Visual Basic classes which share a simple interface for clients to submit entries to a log, while each class implements the logging in its own particular fashion (e.g., written to a file, submitted to a syslog server).
Passlog is a Visual Basic program to allow windows access to be logged to syslog. While it is not intended to be a high security program it can provide some basic security and logging of user logins.