Secure Online Fax and Business Text Messaging Service
Elevate your business communications with secure SMS and fax solutions.
Send and receive SMS and fax online, from email, app or with our developer friendly SMS & fax API. HIPAA compliant & ISO 27001 certified. Outstanding value and 5-star service.
Learn More
Workable Hiring Software - Hire The Best People, Fast
Find the best candidates with the best recruitment software
Workable is the preferred software for today's recruiting industry and HR teams, trusted by over 6,000 companies to streamline their hiring processes. Finding the right person for the job has never been easier—users now possess the ability to manage multiple hiring pipelines at once, from posting a job to sourcing candidates. Workable is also seamlessly integrated between desktop and mobile, allowing admins full control and flexibility all in the ATS without needing additional software.
Tool for automatic security and configuration testing
Tstconfig is a system administration tool that tests (a large number of) configuration files automatically. Mainly intended for security, it can be used to test any configuration file on a Linux system.
The distribution includes examples for testing sshd, ufw, fail2ban, apache, php, mysql, /etc/passwd, and more.
openlsm - Web based open source, Linux Server Management(LSM) -LAMP ,FTP,Jabber, Samba,NFS,LDAP and MySQL based virtual hosting, Squid,Backup,Quota,Mail ,spam-assassin, mailable,Asterisk, web hosting, Load balancing, nagios and ganglia monitoring.
This authentication plug-in enables LDAP single sign-on's from web portal SSL forms and uses a modified standalone version of the core LDAP Authentication Plug-in. Currently supports MS-ADLS (AD), and OpenLDAP (RFC2307 compliant) Server back ends.
XAMPLE creates a separate, encrypted and independent LAMP environment on a system that does or does not already run a web server and database. It is useful to provide a customized environment for software refusing to work with the installed LAMP stack.
Secwatch is an intrusion detection system using log analysis to detect service scan and other brute-force attempts on a server or other computer using system logs and will create temporary firewall rules to block offending IPs
Deploid is a web-based resource deployment management system for managing resources in a multi-tiered web environment. It leverages the use of versioning control software to efficiently push resources to testing and production environments.