481 projects tagged "Logging"

No download Website Updated 07 Jul 2013 BSM Pseudonymizer

Screenshot
Pop 29.46
Vit 1.74

BSM Pseudonymizer pseudonymizes records from Solaris BSM audit trail files. Personal data such as user IDs, pathnames, timestamps, etc. is replaced with pseudonyms so that the generated output doesn't reveal private information about the system's users, but still preserves a maximum of integrity and consistency.

Download Website Updated 09 Dec 2002 BW-IPFM

Screenshot
Pop 9.85
Vit 2.00

BW-IPFM uses ipfm log files to generate easy-to-read reports. It can provide daily and monthly reports and reports for a specific period.

Download Website Updated 29 Sep 2003 Bait and Switch Honeypot System

Screenshot
Pop 50.27
Vit 1.45

The Bait and Switch Honeypot System combines the snort Intrusion Detection System (IDS) with honeypot technology to create a system that reacts to hostile intrusion attempts by marking and then redirecting all "bad" traffic to a honeypot that partially mirrors your production system. Once switched, the would-be hacker is unknowingly attacking your honeypot instead of the real data, while your clients and/or users are still safely accessing the real system. Life goes on, your data is safe, and you get to learn about the bad guy as an added benefit. It works with Snort 1.9.0, 1.9.1, and 2.0.2.

Download Website Updated 09 Mar 2006 Band Saw

Screenshot
Pop 42.60
Vit 1.89

Band Saw is a syslog monitoring program for GNOME. It allows the user to define filters that specify which log messages should be drawn to the user's attention. Combined with syslog's remote logging functionality it provides an effective, scalable, and easily deployed monitoring solution.

No download Website Updated 03 Aug 2006 Bandit

Screenshot
Pop 21.84
Vit 53.44

Bandit is a system of loosely-coupled components that provide consistent identity services and create a community that organizes and standardizes identity-related technologies in an open way, promoting both interoperability and collaboration. It implements open standard protocols and specifications so identity services can be constructed, accessed, and integrated from multiple identity sources. The Bandit system supports many authentication methods and provides user-centric credential management.

Download Website Updated 02 Jan 2008 Bandwidth Management Tools

Screenshot
Pop 292.27
Vit 6.54

Bandwidth Management Tools is a total bandwidth management solution for Linux and can be used for firewalling, traffic graphing, and shaping. It is not based on any currently-available bandwidth management software and supports packet queues, bursting, complex traffic flow hierarchies, flow groups, traffic logging, and a simple real-time monitoring front-end.

Download Website Updated 09 Oct 2005 Basic Analysis and Security Engine

Screenshot
Pop 147.36
Vit 3.19

BASE is the Basic Analysis and Security Engine. It is based on the code from the Analysis Console for Intrusion Databases (ACID) project. This application provides a Web frontend to query and analyze the alerts coming from a Snort IDS.

Download No website Updated 10 Mar 2014 Beobachter

Screenshot
Pop 209.03
Vit 17.80

Beobachter is a file monitor, usually used to watch log files. It has a Java Swing interface that allows the user to customize the highlighting of the logs depending on the log type. It is a very simple, multi-platform, fast, and practical tool.

Download Website Updated 30 Nov 2007 BigDaddy

Screenshot
Pop 31.06
Vit 1.00

BigDaddy is a program for monitoring servers. It is similar to Nagios, with the added benefit of also monitoring and controlling the crontab (or any scheduled application) across an entire fleet of servers. The application comes in the form of a daemon for monitoring and reporting as well as an easy-to-use Web-based GUI for controlling monitoring, viewing timelines of incidents, filing incidents and graphing statistics. The application is extensible with any sort of monitoring module and notification is based on a five step escalation process.

Download Website Updated 28 Feb 2008 BlueProximity

Screenshot
Pop 78.63
Vit 2.94

BlueProximity helps add a little more security to the desktop. It does so by detecting a certain Bluetooth device, most likely a mobile phone, and keeping track of its distance. If it is moved away from the computer and the distance is above a certain level (no measurement in meters is possible) for a given time, it automatically locks the desktop (or starts any other shell command wanted). Once away, the computer awaits its master's return: if the device is nearer than a given level for a set time, the computer unlocks without any interaction (or starts any other shell command wanted).

Screenshot

Project Spotlight

yuck

A command line option parser for C that works on a minimal set of dependencies.

Screenshot

Project Spotlight

NTP

A time synchronization daemon which keeps your system time accurate.