Muse Proxy is a highly customizable multi-platform proxy server. It is easy to use and configure, acting successfully as a gateway to authenticated restricted content, rewriting Web server, Web Access Management, proxy server, and reverse proxy. It has been used for more than 10 years within the Muse Federated Search Platform to manage the authentication to resources and the navigation to full text, by restoring the server session on the end-user browser.
C-ICAP Classify is a module that allows classification (labeling) of Web pages, images, and soon video based on content. Labels are placed in HTTP headers. Any PIC-Label META tags are exported into HTTP headers. This allows for creation of very flexible filters according to rules defined by the user, using the ICAP enabled proxy's ACLs. It is not a URL filter, so implementing it with sslBump or similar proxy technologies makes it very difficult to bypass. Text classification is done using Fast Hyperspace (based on Hyperspace from CRM114) and/or a Fast Naive Bayes. Image and video (when implemented) use haar feature detection from the OpenCV library.
BGPHist is a tool that receives MP-BGP updates, decodes them, and writes them to a database for logging and monitoring purposes. It supports not only Internet routes, but also IPv4 VPN, IPV6 VPN, and L2VPN. It sounds text output, MySQL databases, and Oracle databases. For the MySQL backend, there is also a simple PHP frontend. It could be used to monitor and log an ISP's customer activity for Internet and VPNs, as a passive BGP looking glass, or as a backend for some external monitoring and accounting system.
The Assimilation Monitoring Project is a highly scalable discovery-driven monitoring system. It integrates continuous discovery of servers, services, service dependencies, switch connections, and lots of other things into the monitoring process. The discovery is "stealthy" and will never set off any network security alarms. Adding servers doesn't measurably increase monitoring load, and the system is expected to easily scale into the 100K server range. The discovery work is distributed among all the nanoprobes (agents), which run scripts that spit out JSON. The central system (CMA) stores these strings and runs optional plugins to create graph nodes.
jWatchdog delivers a simple watchdog to actively monitor your infrastructure and send you notifications in case something goes wrong. It is configured using a simple XML configuration file. This configuration file can be changed on-the-fly without a need to restart the watchdog. jWatchdog does not offer data collection itself. It assumes that you already collected the data on which you want to run jWatchdog. The de facto standard tool Collectd is recommended for data collection. jWatchdog assumes that you use the RRDTool collectd output plugin to store the collected data in RRD files, or use Graphite as a datasource.