Inspections+ Mobile forms for Dynamics 365 - Resco.net
Start collecting field data without the hassles of complicated development thanks to resco.Inspections' native integration with Dynamics 365.
Equip your frontline teams with a robust digital solution to simplify data collection and reporting. Handle inspections and audits effortlessly, even in remote locations, and create comprehensive reports on the spot, all integrated with Dynamics 365.
Learn More
Network Discovery Software | JDisc Discovery
JDisc Discovery supports the IT organizationss of medium-sized businesses and large-scale enterprises.
JDisc Discovery is a comprehensive network inventory and IT asset management solution designed to help organizations gain clear, up-to-date visibility into their IT environment. It automatically scans and maps devices across the network, including servers, workstations, virtual machines, and network hardware, to create a detailed inventory of all connected assets. This includes critical information such as hardware configurations, software installations, patch levels, and relationshipots between devices.
Features of Cyberarmy.com brought direct to your desktop. They don't want it, so this projects kinda dead, wish I hadn't started it so early haha. Any ideas for an alternate purpose (not an IM client): jwinsatt@adelphia.net
Overcoat encrypts your projects exe file before distribution (for shareware authors for example), that limits the use of an exe file, and forces the user to purchase/registar after a certain developer defined period
ToogleBox: Simplify, Automate and Improve Google Workspace Functionalities
The must-have platform for Google Workspace
ToogleBox was created as a solution to address the challenges faced by Google Workspace Super Admins. We developed a premium and secure Software-as-a-Service (SaaS) product completely based on specific customer needs. ToogleBox automates most of the manual processes when working with Google Workspace functionalities and includes additional features to improve the administrator experience.
A command line utility written in VisualBasic to assist system administrators at institutions such as schools to minimise the use and storage of inappropriate material in Server shares. User-definable rules for file deletion can be created.
Clouseau for SQL Server is designed to aid system administrators (SAs) and Microsoft SQL Server database administrators (DBAs) in the identification and resolution of various vunerabilities found within Microsoft's enterprise database server:
No-Nonsense Code-to-Cloud Security for Devs | Aikido
Connect your GitHub, GitLab, Bitbucket or Azure DevOps account to start scanning your repos for free.
Aikido provides a unified security platform for developers, combining 12 powerful scans like SAST, DAST, and CSPM. AI-driven AutoFix and AutoTriage streamline vulnerability management, while runtime protection blocks attacks.
A utility that lists all URLs in a user's Internet Explorer cache. The list can be exported to a text file or copied to the clipboard. Written in VisualBasic for most Windows versions.
OpenSSL Digest frontend for Windows. This program can be used to create/verify MD2/MD4/MD5/SHA/SHA1/MDC2/RIPEMD160 checksums of your files. OpenSSL32 now supports file encryption/decryption using various encryption Ciphers, such as Blowfish, Idea, DES,
The chgpw utility changes account passwords on machines across a peer-to-peer LAN. Shows how VB.NET can make interop calls to some of the Net API functions.
Direct Connect Hub Script Creator - Designs Custom Scripts For The DC Hub - Chose Options And Then Hit Preview So You Can See Script Before It Is Actually Written - 20 Operator Functions And 4 Levels Of OPs So Each Level Can Be Given Different Powers
The File Shredder securely shreds files by overwriting them before they are deleted. Every character in the file is overwritten with customised random data, so it is secure, but a little slow. The file is also given a random name.
ISO 17799 - Code of practice for information security management. Creation of methodology and documentation for audit adapted to ISO. One is made up of an introduction on general aspects of the security of the information.
The Program Killer is a Delphi 6 program that monitors the Process List on Windows 95/98/Me and Windows NT4/2000/XP for unauthorized EXE files (User Definable) and if found, those Processes are Terminated via the Windows API.
Passlog is a VisualBasic program to allow windows access to be logged to syslog. While it is not intended to be a high security program it can provide some basic security and logging of user logins.
This will be a project that allows the secure storage of authorization, such as passwords as user names for any computer program that requiers the task of memorizing the authorzation infomation.
A number of tools to enhance management/coding of NFR (http://www.nfr.net) IDA, and various other admin tools that can be used for both NFR and hand coding other appliance scripts.
RanPass 2.0, the successor to the simple and MS-DOS interfaced RanPass 1.0. RanPass is a Random Password Generator. RanPass will use a unique Algarythm(s) to generate a Random Password. This type of software is really useful to a Secure Network.
Pi is a encrypted, distributed file sharing, IM, and Multi-User Chat tool that is backwards compatible with existing Gnutella networks, and allows for the creation and discovery of Gnutella channels.
Originally a software partnership between my best friend and myself, Diverse Developments seeks to write "useful stuff", of a very diverse nature...
Current projects include a file encoder, and a double-entry accounts package.