Monitoring, Securing, Optimizing 3rd party scripts
For developers looking for a solution to monitor, script, and optimize 3rd party scripts
c/side is crawling many sites to get ahead of new attacks. c/side is the only fully autonomous detection tool for assessing 3rd party scripts. We do not rely purely on threat feed intel or easy to circumvent detections. We also use historical context and AI to review the payload and behavior of scripts.
Learn More
B2i offers full-service IR websites, widgets and plugins
Built for IR professionals who work for, or support public companies
B2i Technologies provides the most robust and versatile tools to manage your Corporate website, Investor Relations website and email communications. Our Investor Relations Software solutions work through automation and implements into existing systems with ease in only a few steps. Our solutions not only help you stay compliant but save valuable time while reporting and delivering critical financial data and press release activities to investors. B2i's Investor Relations Solution provides highly reliable and customizable data for corporate websites including press releases, stock data, charting, and SEC filings within SOX compliance standards. Our investor relations software displays real-time data on your website without requiring additional work on your behalf. Once you have completed your filings and press releases they are automatically loaded onto your website and formatted for easy access.
UUMATE is a respin of Ubuntu Mate (https://ubuntu-mate.org/)
The main goal of this project is simple: Just have an updated Ubuntu Mate 64bit ready to install, with full multimedia support, compiz, many extra applications and some cosmetic changes. Many PPAs/Repos already available.
Event sounds (minimize, maximize, close, etc...) enabled by default you can enable/disable compiz using "mate-tweak"!
No need to download hundred megabytes after installation!
Note: To burn the ISO to a USB...
BadTuxWall will help you to implement your own firewall on a Linux operating system using an efficient graphical user interface. It also allows you to generate iptables scripts, export them and share them with friends.
AI-powered contract management that helps businesses track spending, negotiate smarter, and never miss deadlines.
Concord serves small and mid-sized businesses and Fortune 500 companies. This robust, web-based platform is used by human resource, sales, procurement, and legal teams, and virtually anyone who deals with contracts.
TEF is a fully-featured, secure and has advanced capabilities including the intuitive Xsentry easy-to-use administration graphical user interface with WYSIWYG (What You See Is What You Get) front end which has drag and drop security policy deployment.
Kally is a software agent embedded in OpenOffice. We have created a simple interface to allow agents powered by GLORIA (gloria.sourceforge.net) to act as help assistants for users of OpenOffice, the office suite.
We are developing a suite of software to control USB I/O devices.
Initially the support will be for Windows and Linux hosted Human Interface Devices (HID) although hopefully this will extend to virtual comms. port control in the future. API coming...
This interface will allow you to write code to retrieve and send promiscuous network packets from your Java program. It could provide a starting point for a java nmap or such...
it hs a gui ( graphical user interface) with minimal amount of software. it will only have the nessary to work. but u can download programmes off the net. it will have the console and system tools.
Fax.Cloud delivers encrypted, point-to-point faxing with guaranteed delivery and built-in audit trails
For organizations in regulated industries needing a solution to replace traditional fax infrastructure and integrate with email or online portals
Unlike email or file-sharing tools, Fax.Cloud doesn’t bounce around the internet, exposed and vulnerable. It’s direct, encrypted, and verified. You get delivery confirmation, audit trails, and peace of mind, without the spam filters, metadata leaks, or cyber threats.