Started in 2010, as an independent research initiative, 0th Root was setup with a simple website to distribute software and provide documentation for users. Initially, our research involved understanding the SSH protocol and developing a library which can manage multiple servers remotely.
0th Root Software Research Private Limited was incorporated in April of 2013 to continue the research as an organization. It is headquarted in Bengaluru, India, and run efficiently by a team of committed professionals.
To research and build new technologies, to provide cost effective, reliable and secure software products to consumers, small, and medium enterprises without any hidden or overhead costs.
To research and create new technologies in the field of computer software to help shift the Indian economy towards a product oriented growth.
Cyber security protection for organizations, Networking utilities for web based remote access, and Developer tools to improve productivity in terminals
0SNet is a cyber security software that secures organization's internal web applications. It includes a certificate manager, user manager and a role-based access controls system.
A Web based SSH client which provides a full fledged terminal on the web browser to manage remote hosts seemlessly.
A simple command line utility to run any command inside a virtual terminal to protect it from terminal hangups. This can be very useful when working remotely.
The quickest way to secure an organization's internal websites, without any impact to productivity, is by deploying 0SNet within the organization. It is a central place to manage access to all the internal websites via the in-built role-based access controls system.
“A straight forward, easy to use solution that doesn't get in your way.”
A secure HTTP/TLS server which provides a terminal on the web browser to allow login to remote hosts over SSH. The server accepts input over HTTP/TLS and translates them to standard terminal input for Secure Shell (SSH) Protocol. It is fully functional, mobile friendly, and supports all the features of a typical virtual terminal, including window resizing, copy-paste and scroll history.
Interested in integrating the solution into your platform ? Reach out to us.
Similar to terminal multiplexers such as screen and tmux, 0see implements a terminal emulator. However, 0see is not a multiplexer and it is primarily intended to protect commands run on the terminal from hangups.
Consider this as a modern replacement for nohup.
An overview of managing an internal Certificate Authority, it is not straightforward to just create a root certificate and issue certificates to internal domains and users. The article provides an overview of what it takes to run your own CA…
As the word implies, in a zero-trust security model, no device or user is trusted. And, every request received by the system goes through the validation and authentication steps. This essentially means, no device or user enters the private network of the organization…
It is common to not think about the security of the data stored and processed in your software system, until a disaster strikes. This can lead to significant difficulties later on, due to business interruptions, loss of customer trust, legal ramifications and challenges in securing the data.
Developing a web application requires multiple decisions to be made at an early stage. One of those decisions is the technology stack. While, in many cases, it would boil down to a personal choice, the typical factors include developers experience, production cost and project time frame.
Anyone who has ever browsed the internet should be aware of the small padlock icon on their browser's address bar. It is an indication that the content is loaded securely, and any information provided on the web page will be securely transmitted to website's servers. There are two parts to this padlock though,
It is common to misunderstand adding user authentication as a way for securing the servers. While a layer of authentication can protect the web application from unauthorized users, the technology stack itself may not be protected.