RSS 13 projects tagged "Log Analysis"

Download Website Updated 16 Mar 2014 SendmailAnalyzer

Screenshot
Pop 376.19
Vit 50.19

Sendmail Analyzer is a tool to monitor sendmail usage and generate HTML and graph reports. It reports all you ever wanted to know about email trafic on your network. You can also use it in an ISP environment with per domain and per mailbox reports. Statistics are generated per hour, day, month, and year.

Download Website Updated 13 Dec 2008 AWFFull

Screenshot
Pop 152.48
Vit 7.59

AWFFull is a Web server log analysis program, forked from Webalizer. It adds a number of new features and improvements, such as GeoIP capability, internationalisation, style changes via CSS, extended front page history (more than 12 months), resizable graphs, and lots of backend changes and simplification. The long term goal is to focus on Web Analytics, not just Web Reporting.

Download Website Updated 15 Apr 2014 Octopussy

Screenshot
Pop 1,061.50
Vit 149.44

Octopussy is a solution to manage your logs (also frequently called a SIM/SEM/SIEM Solution). Basically, it stores your logs, produces reports, and raises alerts.

Download Website Updated 14 Nov 2013 Free-SA

Screenshot
Pop 227.75
Vit 23.29

Free-SA is tool for statistical analysis of daemons' log files, similar to SARG. Its main advantages over SARG are much better speed (7x-20x), more support for reports, and W3C compliance of generated HTML/CSS reports. It can be used to help control traffic usage, to control Internet access security policies, to investigate security incidents, to evaluate server efficiency, and to detect troubles with configuration.

No download Website Updated 21 Aug 2007 Karmasphere Parallel Data Processing Language

Screenshot
Pop 67.59
Vit 1.00

The Karmasphere DP language is a high-performance non-blocking parallel language for performing data processing. It is designed to give the user a high degree of control over the usage of system resources, such as how many CPU cores or how much disk I/O time to use, without requiring the software developer to explicitly consider these issues in code. The implementation is a stand-alone library that can be used in any Java 1.5 environment. It can take full advantage of multiprocessor (SMP or NUMA) systems, and may be scaled sideways: since the interpreter and environment are stateless, an entire cluster of machines may run the interpreter in parallel without any need for synchronization.

Download Website Updated 26 Feb 2008 SELECT

Screenshot
Pop 27.42
Vit 1.00

SELECT allows you to execute SQL queries on text files. It works by loading the text file into an in-memory SQLite database and then executing the query on that. It supports some popular log file formats like access_log and generically every kind of log file.

No download Website Updated 31 Aug 2010 Piwik

Screenshot
Pop 133.09
Vit 2.58

piwik is a Web analytics software. It gives interesting reports on your Web site visitors, your popular pages, the search engine keywords they used, the languages they speak, and much more. It aims to be an alternative to Google Analytics.

No download Website Updated 12 May 2008 pySortNet

Screenshot
Pop 27.39
Vit 1.00

pySortNet sorts IP addresses (IPv4 and IPv6) and hostnames given on standard input such that addresses and names are grouped in logical groups.

Download Website Updated 02 Oct 2009 Zero RRD Framework

Screenshot
Pop 47.60
Vit 1.86

Zero RRD Framework provides a central HTTP-based service for importing into standard RRD databases and for generating graphs. A lightweight, easily extendable agent for the data sources pushes updates with minimal resource consumption to the master service using HTTP. With the introduction of VMs for the service, it's easy to test-drive the application and even the architecture (connecting agents to the service in the VM).

Download Website Updated 21 Oct 2010 DenyThem

Screenshot
Pop 42.43
Vit 1.52

DenyThem is a program designed to protect your Linux system from malicious attacks. It is an active response system to disrupt and block dictionary attacks and DOS attacks. DenyThem by default uses /var/log/syslog and /var/log/auth.log and searches for hack attempts. When DenyThem finds enough hack attempts from a single host, it will add a DROP statement to your system's firewall, thus preventing future attacks. DenyThem uses iptables, so it will only work on Linux or any other system that uses iptables. It can also block traffic from specific countries.

Screenshot

Project Spotlight

Memos

Note taking software with hack value.

Screenshot

Project Spotlight

Razer device configuration tool

A Razer device configuration tool.