RSS 890 projects tagged "Linux"

Download No website Updated 20 Jan 2011 AAFID2

Screenshot
Pop 135.58
Vit 1.00

AAFID (Autonomous Agents for Intrusion Detection) is a distributed monitoring architecture with an orientation towards Intrusion Detection developed at the CERIAS at Purdue University. AAFID2 is a prototype implementation of the architecture that includes several ready-to-work agents, plus development facilities for writing your own.

No download Website Updated 30 Jan 2001 Aduva Manager

Screenshot
Pop 70.21
Vit 1.42

Aduva Manager is a package manager with automatic download and dependency checking, system sanity checking, a package security updater, kernel compilation/installation, and a hardware plug-and-play installer for RH6.x boxes.

No download Website Updated 07 May 2001 Alamin GSM SMS Gateway

Screenshot
Pop 210.42
Vit 2.73

The Alamin GSM SMS Gateway is a group of daemons that allows you to send/receive SMS messages from any GSM device that supports AT+ commands (GSM modems or GSM mobile phones) or supported by Gnokii. A client program allows you to send messages from any IP client. An SMTP interface is provided to allow MTAs to send SMS directly to the GSM network. IMP (Incoming Message Processor) modules allows you to extend functionality to implement banking, network administration, bd querys, etc. from a GSM mobile phone.

No download Website Updated 29 Jan 2001 Astaro Portscan Detection

Screenshot
Pop 107.99
Vit 69.47

Astaro Portscan Detection is a netfilter target which will attempt to detect TCP and UDP port scans and log them to syslog. This target is based upon Solar Designer's scanlogd. It suppports mutliple levels of logging, custom prefixes for entries, weighted total port scan detection, and port scan temporal spread detection.

Download Website Updated 28 Mar 2012 Astaro Security Gateway

Screenshot
Pop 1,380.39
Vit 34.47

Astaro Security Gateway (formerly Astaro Security Linux) is an all-in-one network security gateway that includes a firewall, intrusion protection, antivirus, spam protection, URL filtering, and a VPN gateway. Features include a modern packet filter, intrusion detection and prevention, portscan detection, application control, content filtering, virus detection for email and Web traffic, profile handling, L2TP, IPSec, SSL, and PPTP VPN tunneling, spam blocking, proxies for HTTPS, HTTP, FTP, POP3, SMTP, DNS, VoIP, SOCKS, and Ident, logging, and reporting. It supports Ethernet, VLAN, PPP, PPPoE, PPPoA, Cable Modem, IPv6, QoS, Link Aggregation, and WAN-Uplink-Load balancing in routing, and bridge mode. The WebAdmin GUI, Install Wizard, Change Tracking, Printable Configuration, and Up2Date service make it easy to install, manage, and maintain.

No download Website Updated 01 May 2009 audio-entropyd

Screenshot
Pop 93.63
Vit 4.21

audio-entropyd feeds the /dev/random device with entropy data read from an audio device. The audio data is not copied as is, but first 'de-biased' and analyzed to determine how many bits of entropy are in it. This program is useful for systems doing many cryptographic tasks like VPN endpoints or GPG clients; it helps prevent the /dev/random device from being depleted and blocking reads.

Download Website Updated 21 Jul 2012 authforce

Screenshot
Pop 73.24
Vit 3.93

Authforce is an HTTP authentication brute forcer. Using various methods, it attempts brute force username and password pairs for a site. It has the ability to try common usernames and passwords, username derivations, and common username/password pairs. It is used both to test the security of your site and to highlight the insecurity of HTTP authentication due to the fact that users just don't pick good passwords.

Download Website Updated 30 Jan 2001 BFBTester - Brute Force Binary Tester

Screenshot
Pop 73.61
Vit 1.44

BFBTester is good for doing quick, proactive security checks of binary programs. BFBTester will perform checks of single and multiple argument command line overflows and environment variable overflows. It can also watch for tempfile creation activity to alert the user of any programs using unsafe tempfile names.

Download Website Updated 05 Jan 2004 Big Brother

Screenshot
Pop 246.06
Vit 7.09

Big Brother is a combination of monitoring methods. Unlike SNMP where information is just collected and devices polled, Big Brother is designed in such a way that each local system broadcasts its own information to a central location. Simultaneously, Big Brother also polls all networked systems from a central location. This creates a highly efficient and redundant method for proactive network monitoring.

Download Website Updated 13 Apr 2004 C-Kermit

Screenshot
Pop 145.19
Vit 2.95

C-Kermit is a combined serial and network communication software package offering a consistent, medium-independent, cross-platform approach to connection establishment, terminal sessions, file transfer, character-set translation, numeric and alphanumeric paging, and automation of communication tasks. Recent versions include FTP and HTTP clients as well as an SSH interface, all of which can be scripted and aware of character-sets. It supports built-in security methods, including Kerberos IV, Kerberos V, SSL/TLS, and SRP, FTP protocol features such as MLSD, and source-code parity with Kermit 95 2.1 for Windows and OS/2.

Screenshot

Project Spotlight

Arcavias Core

High performance e-commerce.

Screenshot

Project Spotlight

SIREMIS Web Management Interface

A Web management interface for Kamailio (OpenSER).