RSS 28 projects tagged "Windows"

No download Website Updated 07 Apr 2014 Joget Workflow

Screenshot
Pop 472.59
Vit 18.35

Joget Workflow is a platform to easily build enterprise Web apps for cloud and mobile. Build full-fledged apps, e.g. CRM, HR, Healthcare, etc. Drag and drop forms, lists, and UI elements. Add workflows to automate processes. Extend via plugins. Apps are mobile optimized and cloud ready. Download ready made apps from the Joget Marketplace.

No download Website Updated 17 Feb 2014 MQ Standard Security Exit

Screenshot
Pop 33.67
Vit 5.39

MQ Standard Security Exit is a solution that allows a company to control and restrict who is accessing a WebSphere MQ resource. The security exit will operate with WebSphere MQ v6.0, v7.0, v7.1, or v7.5 in Windows, IBM i (OS/400), Unix, and Linux environments. It works with Server Connection, Receiver, Requestor, and Cluster-Receiver channels of WebSphere MQ queue manager. The MQ Standard Security Exit solution is comprised of a server-side security exit.

No download Website Updated 17 Feb 2014 MQ Message Encryption

Screenshot
Pop 47.43
Vit 4.44

MQ Message Encryption (MQME) is a solution that provides encryption for WebSphere MQ message data while it resides in a queue and in the MQ logs. It uses AES and offers the ability to control who accesses protected queues. This control is obtained through the use of UserID grouping, and group files are similar to the Unix /etc/group file. It also has the ability to generate and validate messages using a SHA-2 digital signature.

No download Website Updated 17 Feb 2014 MQ Channel Encryption

Screenshot
Pop 32.20
Vit 4.72

MQ Channel Encryption (MQCE) is a solution that provides AES encryption for message data flowing between WebSphere MQ (WMQ) resources. It operates with Sender, Receiver, Server, Requestor, Cluster-Sender, Cluster-Receiver, Server Connection, and Client Connection channels of the WMQ queue managers. It is a simple drop-in solution and can be configured as a queue manager channel message exit or as a channel sender/receive exit pair.

No download Website Updated 17 Feb 2014 MQ Authenticate User Security Exit

Screenshot
Pop 58.36
Vit 5.39

MQ Authenticate User Security Exit (MQAUSX) is a solution that allows a company to fully authenticate a user who is accessing a WebSphere MQ resource. It verifies the user's user ID and password (and possibly domain name) against the server's native OS system (or domain controller) or a remote LDAP server. The security exit will operate with WebSphere MQ v6.0, v7.0, v7.1, or v7.5 in Windows, iSeries (OS/400), Unix, and Linux environments. It works with Server Connection, Client Connection, Sender, Receiver, Server, Requestor, Cluster-Sender, and Cluster-Receiver channels of WebSphere MQ queue manager. The MQ Authenticate User Security Exit solution is comprised of 2 components: client-side security exit and server-side security exit.

No download Website Updated 17 Feb 2014 MQ Auditor

Screenshot
Pop 29.87
Vit 4.00

MQ Auditor is a solution that allows a company to audit and track all MQ API calls performed by MQ applications that are connected to a queue manager. The API Exit operates with WebSphere MQ v7.0, v7.1, or v7.5 in Windows, Unix, IBM i, and Linux environments. Under WMQ v5.3 and higher, MQA audits the following MQ API calls: MQCONN, MQCONNX, MQOPEN, MQGET, MQPUT, MQPUT1, MQINQ, MQSET, MQCLOSE, MQDISC, MQBACK, MQBEGIN, and MQCMIT. Under WMQ v6.0.2.7 and higher, MQA audits the above calls as well as the following calls: XASTART, XAEND, XAOPEN, XACLOSE, XACOMMIT, XACOMPLETE XAFORGET, XAPREPARE, XARECOVER, XAROLLBACK, AX_REG, and AX_UNREG. Under WMQ v7.0 and higher, MQA also audits the following additional MQ API calls: MQCALLBACK, MQCB, MQCTL, MQSTAT, MQSUB, and MQSUBRQ.

Download Website Updated 11 Feb 2014 pedsim

Screenshot
Pop 238.34
Vit 14.43

PEDSIM is a microscopic pedestrian crowd simulation system. The PEDSIM library allows you to use pedestrian dynamics in your own software. Based on pure C++/STL without additional packages, it runs on virtually every operating system. The PEDSIM Demo Application (Qt) gives you a quick overview of the capabilities, and is a starting point for your own experiments. PEDSIM is suitable for use in crowd simulations (e.g. indoor evacuation simulation, large scale outdoor simulations), where one is interested in output like pedestrian density or evacuation time. The quality of the individual agent's trajectory is high, PEDSIM can be used for creating massive pedestrian crowds in movies. Since libpedsim is easy to use and extend, it is a good starting point for science projects.

No download Website Updated 17 Jan 2014 Dolphin Dispatch

Screenshot
Pop 38.78
Vit 9.86

Dolphin Dispatch is trucking dispatch software that allows you to track dispatches, convert completed loads into invoices, and receive cash against invoices. Rates can be automatically generated based on origin and destination zip codes. It offers: unlimited users/multi-user, and unlimited data in a MySQL database. It can quickly convert completed loads into invoices, upload additional documents associated with loads, and email or text drivers directly from the system.

No download Website Updated 24 Dec 2013 PHP Live!

Screenshot
Pop 405.24
Vit 30.40

PHP Live is live support software powered by PHP and MySQL. Functions include unlimited operators, unlimited departments, social media links in the chat window, department unique logo and chat icons, themes, click tracking, Website traffic monitoring, and more.

Download No website Updated 17 Nov 2013 360-FAAR Firewall Analysis Audit and Repair

Screenshot
Pop 204.48
Vit 10.56

360-FAAR (Firewall Analysis Audit and Repair) is an offline, command line, Perl firewall policy manipulation tool to filter, compare to logs, merge, translate, and output firewall commands for new policies, in Checkpoint dbedit, Cisco ASA, or ScreenOS commands. It is all contained in one file. It can read policy and logs for: Checkpoint FW1 (in odumper.csv / logexport format), Netscreen ScreenOS (in get config / syslog format), and Cisco ASA (show run / syslog format). It uses both inclusive and exclusive CIDR and text filters, permitting you to split large policies into smaller ones for virutalization at the same time as removing unused connectivity. It supports policy to log association, object translation, rulebase reordering and simplification, rule moves, and duplicate matching automatically. It allows you to seamlessly move rules to where you need them. 'print' mode creates a spreadsheet for your audit needs with one command.

Screenshot

Project Spotlight

Vendetta Online

A multiplatform, 3D space-combat MMORPG.

Screenshot

Project Spotlight

GNUnet

A framework for secure peer-to-peer networking.