RSS 103 projects tagged "Monitoring"

Download No website Updated 17 Nov 2013 360-FAAR Firewall Analysis Audit and Repair

Screenshot
Pop 204.48
Vit 10.56

360-FAAR (Firewall Analysis Audit and Repair) is an offline, command line, Perl firewall policy manipulation tool to filter, compare to logs, merge, translate, and output firewall commands for new policies, in Checkpoint dbedit, Cisco ASA, or ScreenOS commands. It is all contained in one file. It can read policy and logs for: Checkpoint FW1 (in odumper.csv / logexport format), Netscreen ScreenOS (in get config / syslog format), and Cisco ASA (show run / syslog format). It uses both inclusive and exclusive CIDR and text filters, permitting you to split large policies into smaller ones for virutalization at the same time as removing unused connectivity. It supports policy to log association, object translation, rulebase reordering and simplification, rule moves, and duplicate matching automatically. It allows you to seamlessly move rules to where you need them. 'print' mode creates a spreadsheet for your audit needs with one command.

Download Website Updated 21 Oct 2010 DenyThem

Screenshot
Pop 42.57
Vit 1.52

DenyThem is a program designed to protect your Linux system from malicious attacks. It is an active response system to disrupt and block dictionary attacks and DOS attacks. DenyThem by default uses /var/log/syslog and /var/log/auth.log and searches for hack attempts. When DenyThem finds enough hack attempts from a single host, it will add a DROP statement to your system's firewall, thus preventing future attacks. DenyThem uses iptables, so it will only work on Linux or any other system that uses iptables. It can also block traffic from specific countries.

Download Website Updated 10 Oct 2010 Traffpro

Screenshot
Pop 125.40
Vit 4.99

Traffpro is a Linux-based traffic control, traffic accounting, bandwidth shaping, bandwidth management, and network security system with many features for reporting and billing. Internet access can be distributed to a LAN and users can be assigned a traffic quota. Networks are protected from external intrusions with a firewall. You can control ports, blacklist URLs, add iptables rules, configure multiple ISPs and multiple subnets, detect viruses, view URL histories (without Squid), see the traffic consumed by individual users, and more. It also has a ticket support system and a captive portal module.

Download Website Updated 19 Feb 2010 JumpBox for Nagios

Screenshot
Pop 39.70
Vit 1.95

Nagios is a host, service, and network monitoring system that will watch your network and alert you to problems before your clients or end-users do. The system runs checks on hosts and services that you specify using plugins that return status information to Nagios. When problems are encountered, the system will send notifications to system administrators so that they can take action on the problem. The JumpBox for Nagios gives you a head start to using the system. It eliminates the complexity involved in getting the application installed, and allows you to focus on the configuration for your specific environment. Since Nagios is based on plugins, depending on what you want to do this will vary in complexity.

Download Website Updated 15 Aug 2011 Gargoyle Router Management Utility

Screenshot
Pop 85.20
Vit 4.12

Gargoyle is an interface for small, widely available routers such as the Linksys WRT54G series and the La Fonera. It provides functionality above and beyond what the default software provides including sophisticated dynamic DNS, quality of service, and bandwidth monitoring tools. The primary goal is to provide a polished interface for these advanced tools that is at least as easy to configure as any existing firmware. This project is based on top of OpenWrt, but unlike other Web interfaces for OpenWrt it places a strong focus an usability and is meant for average users, not just power users.

Download Website Updated 10 Dec 2008 Nebula Intrusion Signature Generator

Screenshot
Pop 37.52
Vit 1.48

Nebula is a data analysis tool that automatically generates intrusion signatures from attack traces. It runs as a daemon that processes data submitted from honeypots. New signatures are published as Snort rules and can be used to defend a network from future intrusion attempts.

Download Website Updated 11 Jan 2012 Service-Guardian

Screenshot
Pop 42.08
Vit 2.72

Service Guardian aims to protect servers against various things such as resource exhaustion and connection floods. It can measure the number of connections to servers' ports and, after a grace time period, compares and sees if the host is still in violation of the specified settings. If a host is in violation of the settings, it will be filtered out and dropped via netfilter/iptables.

Download Website Updated 13 Apr 2014 ips-qos

Screenshot
Pop 83.46
Vit 1.82

ips-qos is a flexible firewall and traffic shaping tool. It was formerly offered as installers for the popular Linux distributions. The current version is available under Debian GNU/Linux. It was intended to give administrators more control over a shared Internet connection. It includes ips, a flexible and easy-to-use configurable firewall with the ability to control access to the Internet (or selected services) from a LAN. It also includes qos, a traffic shaping tool that measures and controls the traffic load for every computer in a LAN.

Download Website Updated 04 Dec 2008 Nulog2

Screenshot
Pop 55.14
Vit 2.72

Nulog2 is a complete rewrite of Nulog, the historical filtering log analysis solution from INL. It is an application built upon Twisted, an advanced Python framework. It analyzes logs from Netfilter and/or NuFW and displays them on a Web page.

No download Website Updated 19 Aug 2007 Swan

Screenshot
Pop 15.68
Vit 49.39

Swan is a bandwidth manager and Internet gateway that effectively controls and manages the collective bandwidth of an organization. As an Internet gateway it includes a transparent proxy, caching engine, access control lists, caching DNS server, logging and monitoring tools, an authentication mechanism, bandwidth clubbing, and policy management. It is ideal for ISPs, corporations, schools, colleges, etc. Both GUI and console-based interfaces are available for controlling the software. Installation is through a bootable CD that automatically formats the system.

Screenshot

Project Spotlight

Wnotes

Text note windows for X desktops.

Screenshot

Project Spotlight

Aspose.Slides for .NET

A .NET component to read, write, and modify a PowerPoint document.