You Might Also Like
Relax: PRTG Monitors Your IT for You Icon
Relax: PRTG Monitors Your IT for You

Stay in control and avoid IT headaches. PRTG monitors your network, devices, and apps - receive alerts when it matters most.

You’re the go-to IT person, always putting out fires and keeping things running. With PRTG, you get reliable alerts to monitor your entire IT infrastructure, without the noise. Our intuitive setup gives you a clear overview of your network, devices, and applications in real time. Get instant alerts only when something needs your attention, whether you’re at your desk or on the move. Spend less time worrying about outages and more time focusing on what matters. Set up PRTG once and let it work for you - PRTG has you covered.
Start Your Free PRTG Trial Now
Find out just how much your login box can do for your customer | Auth0 Icon
Find out just how much your login box can do for your customer | Auth0

With over 53 social login options, you can fast-track the signup and login experience for users.

From improving customer experience through seamless sign-on to making MFA as easy as a click of a button – your login box must find the right balance between user convenience, privacy and security.
Sign up
Create and run cloud-based virtual machines. Icon
Create and run cloud-based virtual machines.

Secure and customizable compute service that lets you create and run virtual machines.

Computing infrastructure in predefined or custom machine sizes to accelerate your cloud transformation. General purpose (E2, N1, N2, N2D) machines provide a good balance of price and performance. Compute optimized (C2) machines offer high-end vCPU performance for compute-intensive workloads. Memory optimized (M2) machines offer the highest memory and are great for in-memory databases. Accelerator optimized (A2) machines are based on the A100 GPU, for very demanding applications.
Try for free
Powerful Website Security | Continuous Web Threat Platform Icon
Powerful Website Security | Continuous Web Threat Platform

Continuously detect, prioritize, and validate web threats to quickly mitigate security, privacy, and compliance risks.

Reflectiz is a comprehensive web exposure management platform that helps organizations proactively identify, monitor, and mitigate security, privacy, and compliance risks across their online environments. Designed to address the growing complexity of modern websites, Reflectiz provides full visibility and control over first, third, and even fourth-party components, such as scripts, trackers, and open-source libraries that often evade traditional security tools.
Learn More
Monitoring, Securing, Optimizing 3rd party scripts Icon
Monitoring, Securing, Optimizing 3rd party scripts

For developers looking for a solution to monitor, script, and optimize 3rd party scripts

c/side is crawling many sites to get ahead of new attacks. c/side is the only fully autonomous detection tool for assessing 3rd party scripts. We do not rely purely on threat feed intel or easy to circumvent detections. We also use historical context and AI to review the payload and behavior of scripts.
Learn More

Additional Details for cwtbk

Operating Systems

BSD, Linux, Windows

Intended Audience

End Users/Desktop, Telecommunications Industry

User Interface

SDL

Programming Language

C

Registered

2010-09-28

Last Updated

Categories

Ham Radio

Maintainers

soundandfury

Keep Me Updated!