A new responsive design for the main control panel.
Try out the Demo
stSoftware's professional IT and development services are provided by our own web and cloud experts in Australia who are highly trained and experienced. Professional service packages are very popular with our clients as they can utilise the full range of our IT services at discounted rates. Packages include Continuous Improvement Programs (CIP) or Professional Service Packs.
CIPs and Professional Service Packs allow our client's to innovate, disrupt and implement new technology
Our free text shorter service uses a clever combination of word replacement, adorable images and good old fashioned magic to optimize your tweets. In case you don't have hours to sit with your teenager to learn the latest hipster abbreviations this service is for you.
Best practice network design for a highly scalable, distributed web system has:-
We normally use our own in-house development servers, as they are already setup and configured to our solution server requirements it is cost effective and efficient.
We have automated heart beat monitors which checks the health of the servers and a number of background tasks. In addition to checking the list of known tasks database read & write actions are performed and the available disk space is checked. If the heart beat monitor itself takes more than 5 minutes to run an alert is sent. The heart beat monitor runs every 15 minutes.
The list of tasks that the system will monitor are defined in the class DBTask.
A task is defined by:-
SQL injection is a code injection technique, used to attack data driven applications like stSoftware.
stSoftware systems support a number of web accessible protocols including:-
All protocols access the underlying data through the DAL ( data access layer). There is NO direct access to the underlying data store no matter which protocol is used. Each protocol accepts the request to read or write data and then perform the protocols validations and then passes the request on to the DAL to execute the request which in turn validates the request, checks the user's access and perform any validations before returning the result.
SQL & XSS attacks are automatically tested for each of the supported protocols. Listed below are the standard SQL injection strings attempted.
|SQL Injection String|
Events and Resources are managed through multiple Modules.
They are briefly outlined here;
Click on the Export button and then choose the file format of your choice: CSV, PDF or Spreadsheet (EXCEL)
Marking the records by clicking on the left hand checkbox, will export only the selected records.
A new template "Munter" has been added to our Content Management System (CMS). Munter is a very handsome Bootstrap 3 theme. Comes with beautiful features like a fixed arrows navigation, a nice portfolio showcase and a smooth scroll.
We recommend at least quarterly maintenance release are installed to your test environment, tested then promoted to your production system as part of the normal software maintenance cycle.
Regular and timely updates reduce the risks of running a live system that is out of sync with stSoftware's current version and enables your users to benefit from our R&D program, which is our investment and commitment to continually improve our systems for our customers (in recent years we have typically invested
Single sign using Microsoft LAN Manager (NTLM) allows users within a intranet enviroment to use the system without the need to re-enter their password once they have logged into the Windows network.
Note the NTLM protocol can only be used within a internet environment.