RSS 34 projects tagged "English"

Download Website Updated 30 Mar 2011 snortalog

Screenshot
Pop 179.72
Vit 9.37

Snortalog is a powerful Perl script that summarizes Snort logs, making it easy to view any network attacks detected by Snort. It can generate charts in HTML, PDF, and text output. It works with all versions of Snort, and can analyze logs in three formats: syslog, fast, and full snort alerts. Moreover, it is able to summarize other logs like CheckPoint, Netfilter, IPFilter, Packet Filter, Cisco PIX/ASA, NetScreen, TippingPoint, and Lucent BRICK in a similar way.

Download Website Updated 11 Dec 2003 Host4NET

Screenshot
Pop 58.09
Vit 61.48

Host4net is a control panel solution for Web hosting companies and ISP administration, with extended financial and commercial features, made to ease the process of administration in a high density user environment. For now, it depends on Webmin.

Download Website Updated 17 Dec 2006 MyPasswordSafe

Screenshot
Pop 117.64
Vit 3.93

MyPasswordSafe is a straightforward, easy-to-use password keychain/manager that uses the Blowfish algorithm to store encrypted passwords. It uses the same file format as Password Safe.

No download Website Updated 05 May 2012 passwd_exp

Screenshot
Pop 92.95
Vit 6.98

Passwd_exp notifies users via email of upcoming password or account expiration. Its simple modular architecture allows you to perform expiration checks on any data source you use (SQL databases, LDAP...), send expiration warnings only to desired users or group and on selected days only. Administrators can use it to review expired accounts in the system. Support for Linux and Solaris shadow (including LDAP and NIS systems) and BSD passwd systems is included.

Download Website Updated 10 Apr 2009 Afick Webmin module

Screenshot
Pop 59.42
Vit 6.01

This Webmin module allows for Afick remote administration (in a simple Web browser). It allows administrators to consult history and archive logs, change the Afick configuration, and run Afick.

Download Website Updated 30 Sep 2004 nexB OpenAssets

Screenshot
Pop 148.58
Vit 2.04

nexB OpenAssets is a tool for inventorying, managing, and monitoring applications, software, hardware, networks, and generally any IT asset. It is designed so that system administrators, IT, and finance can determine what they have, how it is configured, what it is used for, and how much it is being used, so that informed decisions can be made. It complements existing network management software, integrates with a growing number of protocols and tools, and features no-agent discovery and inventory, configuration management including dependencies and correlation, monitoring, and reporting. It makes extensive and innovative use of XML, Xpath, and Xquery.

Download Website Updated 09 Apr 2009 Console Password Manager

Screenshot
Pop 187.15
Vit 5.17

cpm (Console Password Manager) is a small console tool to manage passwords and other sensitive data and store them in a public-key encrypted file. It also allows you to configure the whole hierarchy yourself, so it's easily adoptable for many requirements. The encryption is handled through GnuPG, and the data inside is stored as XML.

Download Website Updated 06 Oct 2007 SnortSMS

Screenshot
Pop 68.12
Vit 4.82

SnortSMS is a highly configurable sensor management system that provides the ability to remotely administer Snort [and Barnyard] based Intrusion Detection Systems (IDS), push configuration files, add/edit rules, and monitor system health and statistics, all from a simple and clean Web interface console. Whether you have one or multiple Snort sensors, it can help unify and syncronize all sensor configurations.

No download Website Updated 01 Oct 2009 yet another pak

Screenshot
Pop 62.67
Vit 3.13

Pak transfers multiple, possibly very big, regular files between possibly different hosts you have shell access to. It transmits segment IDs instead of file names and uses on-the-fly Blowfish-CBC encryption while being absolutely restartable with practically no loss of data already transmitted. Encrypted pak streams can be stored in intermediary regular files on untrusted hosts. Several stored pak streams, even truncated ones, can be merged for re-piping without decryption. Integrity is never checked. File offsets of any magnitude are supported via recompilation (the default width is 64 bits). Either UNIX 95 or UNIX 98 conformance is required and sufficient.

Download Website Updated 23 Jul 2006 Shade LSB

Screenshot
Pop 21.21
Vit 1.46

Shade (Steganographically Hide and Analyze Data Entries) is a versatile and feature-rich program designed to analyze and manipulate the LSBs (least significant bits) of files. LSB manipulation is a form of steganography, the art or science of making the existence of information undetectable by normal means. This is achieved by writing the contents of a file to the LSBs of a separate and inconspicuous host file.

Screenshot

Project Spotlight

PCBook

A reservation system for PCs.

Screenshot

Project Spotlight

r6rs-protobuf

Protocol Buffers for R6RS Scheme.