Alerttail monitors a given file and executes a list of actions when a user-defined text pattern has been written to the file. For example, the user can pop up a GTK notification window when a certain message is written to a log file. Actions can be alerttail built in actions (GTK notify action, geoipLocalization action, or filtering text action) or a custom user defined shell command action. A Qt 4 GUI frontend helps with configuration.
The Aware project is an effort to create a software framework for measuring, monitoring, and controlling computer system resources. It is intended to enable system administrators to tune system variables, set monitoring/security alarms, and build adaptive distributed systems. Aware modules may be linked into applications making them 'aware' and able to participate in the larger managed system.
BSM Pseudonymizer pseudonymizes records from Solaris BSM audit trail files. Personal data such as user IDs, pathnames, timestamps, etc. is replaced with pseudonyms so that the generated output doesn't reveal private information about the system's users, but still preserves a maximum of integrity and consistency.
The Bait and Switch Honeypot System combines the snort Intrusion Detection System (IDS) with honeypot technology to create a system that reacts to hostile intrusion attempts by marking and then redirecting all "bad" traffic to a honeypot that partially mirrors your production system. Once switched, the would-be hacker is unknowingly attacking your honeypot instead of the real data, while your clients and/or users are still safely accessing the real system. Life goes on, your data is safe, and you get to learn about the bad guy as an added benefit. It works with Snort 1.9.0, 1.9.1, and 2.0.2.
Bandit is a system of loosely-coupled components that provide consistent identity services and create a community that organizes and standardizes identity-related technologies in an open way, promoting both interoperability and collaboration. It implements open standard protocols and specifications so identity services can be constructed, accessed, and integrated from multiple identity sources. The Bandit system supports many authentication methods and provides user-centric credential management.
Bandwidth Management Tools is a total bandwidth management solution for Linux and can be used for firewalling, traffic graphing, and shaping. It is not based on any currently-available bandwidth management software and supports packet queues, bursting, complex traffic flow hierarchies, flow groups, traffic logging, and a simple real-time monitoring front-end.
CRM114 is a Controllable Regex Mutilator and Smart Filter, designed for easy creation of filters for things like incoming email redirection, spam filtering, system logs, or monitoring processes. Filtering rules can be either hard-coded (such as regexes), soft-coded (calculated at runtime or read from an external file or process), or learned dynamically by phrase matching (as in Bayesian filtering, Markovian matching, Winnowing, or Hyperspatial classification). This makes it possible to create very accurate filters with very little actual work. Accuracies over 99.9% are achievable.