RSS 465 projects tagged "Firewalls"

Download Website Updated 28 Mar 2012 Astaro Security Gateway

Screenshot
Pop 1,377.54
Vit 34.49

Astaro Security Gateway (formerly Astaro Security Linux) is an all-in-one network security gateway that includes a firewall, intrusion protection, antivirus, spam protection, URL filtering, and a VPN gateway. Features include a modern packet filter, intrusion detection and prevention, portscan detection, application control, content filtering, virus detection for email and Web traffic, profile handling, L2TP, IPSec, SSL, and PPTP VPN tunneling, spam blocking, proxies for HTTPS, HTTP, FTP, POP3, SMTP, DNS, VoIP, SOCKS, and Ident, logging, and reporting. It supports Ethernet, VLAN, PPP, PPPoE, PPPoA, Cable Modem, IPv6, QoS, Link Aggregation, and WAN-Uplink-Load balancing in routing, and bridge mode. The WebAdmin GUI, Install Wizard, Change Tracking, Printable Configuration, and Up2Date service make it easy to install, manage, and maintain.

Download Website Updated 05 Apr 2014 CGIProxy

Screenshot
Pop 1,065.21
Vit 151.55

CGIProxy is a Perl CGI script that acts as an Internet proxy. Through it, you can retrieve resources that may be inaccessible from your own machine. The user is kept as anonymous as possible from any servers. HTTP and FTP are supported, and optionally SSL. Common uses include censorship circumvention, VPN-like setups, anonymous proxies, personal proxies, and others. Options include text-only browsing (to save bandwidth), selective cookie and script removal, simple ad filtering, access restriction by server, encoded target URLs and cookies, configuration by end user, and much more (currently over 70 config options). Javascript and Flash are fully supported. Messages are in 12 languages so far. Can be installed as a CGI script, a mod_perl script, a FastCGI script, or with its own embedded secure HTTP server. An online demo is available.

Download Website Updated 29 Jan 2011 Nmap Security Scanner

Screenshot
Pop 975.89
Vit 19.56

Nmap ("Network Mapper") is a utility for network exploration, administration, and security auditing. It uses IP packets in novel ways to determine which hosts are available online (host discovery), which TCP/UDP ports are open (port scanning), and what applications and services are listening on each port (version detection). It can also identify remote host OS and device types via TCP/IP fingerprinting. Nmap offers flexible target and port specifications, decoy/stealth scanning for firewall and IDS evasion, and highly optimized timing algorithms for fast scanning.

Download Website Updated 26 Jan 2013 iptables

Screenshot
Pop 940.88
Vit 23.02

iptables is built on top of netfilter, the packet alteration framework for Linux 2.4.x and 2.6.x. It is a major rewrite of its predecessor ipchains, and is used to control packet filtering, Network Address Translation (masquerading, portforwarding, transparent proxying), and special effects such as packet mangling.

Download Website Updated 16 Mar 2014 LEAF

Screenshot
Pop 815.73
Vit 116.18

LEAF is a secure, feature-rich, customizable embedded Linux network appliance for use in a variety of network topologies. Although it can be used in other ways, it's primarily used as a Internet gateway, router, firewall, and wireless access point.

Download Website Updated 21 Jan 2014 Endian Firewall

Screenshot
Pop 733.24
Vit 30.11

Endian Firewall is an all-in-on Linux security distribution that turns any system into a full-featured security appliance. It features a stateful packet inspection firewall, application-level proxies for various protocols (HTTP, POP3, SMTP), anti-virus support, virus and spam filtering for email traffic (POP and SMTP), content filtering of Web traffic, and a "hassle free" VPN system based on OpenVPN.

Download Website Updated 05 Feb 2014 fwsnort

Screenshot
Pop 722.96
Vit 37.88

fwsnort translates snort rules into an equivalent iptables ruleset. By making use of the iptables string match module, fwsnort can detect application layer signatures which exist in many snort rules. fwsnort adds a --hex-string option to iptables, which allows snort rules that contain hex characters to be input directly into iptables rulesets without modification. In addition, fwsnort makes use of the IPTables::Parse Perl module in order to (optionally) restrict the snort rule translation to only those rules that specify traffic that could potentially be allowed through an existing iptables policy.

Download Website Updated 28 Mar 2012 Firewall Builder

Screenshot
Pop 654.79
Vit 23.04

Firewall Builder consists of a GUI and set of policy compilers for various firewall platforms. It helps users maintain a database of objects and allows policy editing using simple drag-and-drop operations. The GUI and policy compilers are completely independent, which provides for a consistent abstract model and the same GUI for different firewall platforms. It currently supports iptables, ipfilter, ipfw, OpenBSD pf, Cisco PIX and FWSM, and Cisco routers access lists.

Download Website Updated 08 Feb 2009 MailScanner

Screenshot
Pop 652.47
Vit 14.67

MailScanner is an email virus scanner, vulnerability protector, and spam tagger. It supports the Postfix, Sendmail, Exim, Qmail, and ZMailer MTAs, and the Sophos, McAfee, F-Prot, F-Secure, CommandAV, InoculateIT, Inoculan, eTrust, Kaspersky, Nod32, AntiVir, BitDefender, RAV, Panda, DrWeb, ClamAV, and other anti-virus scanners. It uses SpamAssassin for highly successful spam identification, and is designed to handle denial of service attacks. It will detect password-protected zip files and apply filename checking to their contents. It is very easy to install, requires no changes at all to your sendmail.cf file, is designed to be lightweight, and won't grind your mail system to a halt with its load. It can be integrated into any email system, regardless of the software in use.

Download Website Updated 16 Jan 2012 p0f

Screenshot
Pop 586.71
Vit 8.98

p0f is a versatile passive OS and application fingerprinter, and a tool for detecting NAT/connection sharing. It is useful for penetration testing, routine network monitoring, and forensics, and to aid abuse detection tools such as IDSes, spam filters, or honeypots.

Screenshot

Project Spotlight

Granite Data Services

An event-driven, cross-framework, application client container.

Screenshot

Project Spotlight

Java Print Dialog Framework

A comprehensive printing solution for Java applications.