DeskTime is best for medium to large companies, as well as freelancers who want to boost productivity without overworking.
DeskTime is a high-performance, automated time tracking and workforce management solution for teams and freelancers. It runs silently in the background, logging computer activity from the moment of boot-up to ensure 100% accurate data without the need for manual timers.
Learn More
Project Planning and Management Software | Planview
Connect programs, projects, resources, and financials with business outcomes using portfolio management software from Planview.
Planview® Portfolios enables enterprises to accelerate strategic execution by seamlessly integrating business and technology planning, optimizing resources, and leveraging the power of embedded AI — Planview Anvi™ — to deliver breakthrough products, services, and customer experiences. This unified approach aligns strategy with execution, driving enhanced business performance across the organization.
This very simple perl script parses you iptables log files and produces a report in text format with a summary based on the prefix of the log ( --log-prefix option of iptables ).
Prefix description is allowed.
RG-Safe uses the Cryptlib library to keep all your information "safe". You can import files into your SAFE. From there you can securly view it, reencrypt it, export it or email it securly to someone on your keyring. You can sign/check files & also comat
[ Phrozen ] is a freeware/opensource (as in GNU) PHP encoder written in PHP it is entirely contained within this one file. The idea is that you can encode files through the interface. Phrozen also has PHAT functions which act as a file allocation table.
bcrypt is a lightweight blowfish file encryption utility which aims for cross-platform portability of not only the actual code, but the encrypted files as well. In addition to providing 448-bit encryption, bcrypt overwrites input files with random garbage
Airlock Digital - Application Control (Allowlisting) Made Simple
Airlock Digital delivers an easy-to-manage and scalable application control solution to protect endpoints with confidence.
For organizations seeking the most effective way to prevent malware and ransomware in their environments. It has been designed to provide scalable, efficient endpoint security for organizations with even the most diverse architectures and rigorous compliance requirements. Built by practitioners for the world’s largest and most secure organizations, Airlock Digital delivers precision Application Control & Allowlisting for the modern enterprise.
...Has many features which are non-existant in other OTP programs, and includes 5 programs (plus an uninstaller) which allow the user to create keys, create fake keys, encrypt, and decrypt files.
ProSum is a terminal based program that protects your files, sys_call_table and IDT like tripwire way (All in user space, without kernel modules) In addition, database with files etc. could be encrypted with Blowfish algorythm and more.
The File Shredder securely shreds files by overwriting them before they are deleted. Every character in the file is overwritten with customised random data, so it is secure, but a little slow. The file is also given a random name.
An Experimental Platform for Secure Peer Services, QARE uses a decentralized trust model, a Public Key Infrastructure and provides single logon for multiple applications running across multiple systems. WAR files are used to add applications.
OneTimePIM is a comprehensive Product Information Management System designed to streamline the import and distribution of product data.
A single source of truth for all of your product information with easy ways to distribute that data to wherever it needs to go, including the most powerful e-commerce connectors in the industry.
This program allow you to extract files from network traffic under HTTP and FTP protocols. It should permit you to see, for instance, using an antivirus on the files, if a machine of your network have downloaded a virus.
This library is for use in kiosk based projects where disabling the mouse and
keyboard, on any of the Win32 Os versions, is required. This project can be used
as a module in python or as C++ library.
The Program Killer is a Delphi 6 program that monitors the Process List on Windows 95/98/Me and Windows NT4/2000/XP for unauthorized EXE files (User Definable) and if found, those Processes are Terminated via the Windows API.
Found at www.itadmins.net in the Projects area. The complete Linux Administrators CD. For normal system and network administration, security, forensics tools and utilities.
A library implementing the AES (American Encryption Standard) or Rijndael algorithms, intended to provide a neat packaged solution
for other projects to use.
Package includes C and Intel Pentium/MMX assembler versions
of AES, along with an extensive
The htaccess class manages the htaccess functions of Apache Webservers.
Without knowing much knowledge of Apache, users can be added or deleted, groups can be created anddeleted, .htaccess files can be created with this class etc.
The E language is an open-source object-oriented langauge for secure
distributed computation. We are currently hosted on our own sourceforge setup at: http://bugs.sieve.net/projects/e-lang
Free Crypto Token will be a free, operating system independent and standard driven interface to smartcards, key files and other hard- and software crypto tokens. In fact FCT will be a framework for PKCS#11 modules that will also include some implementati
sectar: a program that creates encrypted tape archives(tar files), using the AES algorithm Rijndael. Encryption exported under exemption TSU 740.13.
Was star, now sectar.
Buffer0verfl0w Security is a team of skilled security developers, who are
authoring security applications, whitepapers, and discovering security flaws in
software, publicly disclosing their projects and encouraging volunteers to help improving them.
...It uses the popular algorithms MD5 and IDEA (used in PGP, for example). It detects automatically whether to encrypt or decrypt the given file, and badly deciphered files.