419 projects tagged "Operating System Kernels"

Download Website Updated 12 Nov 2005 VLAN

Screenshot
Pop 187.49
Vit 5.55

VLAN is an implementation of the 802.1Q VLAN protocol for Linux. It allows one to have Virtual LANs on a single ethernet cable, giving you the ability to segregate LANs efficiently. It should support up to 4094 vlan interfaces per ethernet device.

Download Website Updated 06 Feb 2001 Universal TUN/TAP device driver

Screenshot
Pop 40.06
Vit 2.34

TUN provides packet reception and transmission for user space programs. It can be viewed as a simple Point-to-Point or Ethernet device, which instead of receiving packets from a physical medium, receives them from a user space program and instead of sending packets via physical media writes them to the user space program.

No download Website Updated 13 Dec 2007 Linux Intrusion Detection System

Screenshot
Pop 239.82
Vit 5.21

The Linux Intrusion Detection System (LIDS) is a patch which enhances the kernel's security by implementing a reference monitor and Mandatory Access Control (MAC). When it is in effect, chosen file access, all system/network administration operations, any capability use, raw device, memory, and I/O access can be made impossible even for root. You can define which programs can access specific files. It uses and extends the system capabilities bounding set to control the whole system and adds some network and filesystem security features to the kernel to enhance the security. You can finely tune the security protections online, hide sensitive processes, receive security alerts through the network, and more.

No download Website Updated 10 Mar 2002 Extended Attributes and ACLs for Linux

Screenshot
Pop 107.67
Vit 3.47

Linux, in the tradition of UNIX-like operating systems, implements file system permissions using a rather coarse scheme. While this is sufficient for a surprisingly large set of applications, it is too inflexible for many other scenarios. For that reason, all the major commercial UNIX operating systems have extended this simple scheme in one way or the other. This is an effort to implement POSIX-like Access Control Lists for Linux. Access Control Lists are built on top of Extended Attributes, which can also be used to associate other pieces of information with files such as Filesystem Capabilities, or user data like mime type and search keywords.

Download Website Updated 17 Jan 2002 kernel-alert

Screenshot
Pop 29.50
Vit 2.89

kernel-alert is a perl script meant to be run as a cron, to send e-mail whenever new Linux kernels become available. It also has the ability to attach the new patches to the e-mail.

Download Website Updated 30 Jan 2001 Linux IEEE 1394 Subsystem

Screenshot
Pop 30.00
Vit 1.03

The Linux IEEE1394 Subsystem provides support for IEEE 1394 (FireWire, iLink). It is available as a patch for Linux 2.2 and integrated with Linux 2.4.

Download Website Updated 11 Aug 2001 POSIX 1003.1b clock/timer patch

Screenshot
Pop 21.14
Vit 4.17

This patch adds the system calls timer_create, timer_delete, timer_settime, timer_gettime, and timer_getoverrun. The user space library adds also clock_gettime, clock_settime and clock_getres. CLOCK_REALTIME and CLOCK_LINUX_COUNTER are supported.

Download Website Updated 19 Sep 2002 Linux Trace Toolkit

Screenshot
Pop 85.53
Vit 4.65

The Linux Trace Toolkit catalogs system events in minute detail, and allows a user to determine exactly what is transpiring on his system, down to the microsecond.

Download Website Updated 22 Feb 2002 LOMAC

Screenshot
Pop 42.00
Vit 3.83

LOMAC uses Low Water-Mark Mandatory Access Control to protect the integrity of processes and data from viruses, trojan horses, malicious remote users, and compromised network server daemons. The LOMAC loadable kernel module can be used to harden Linux systems without any changes to existing kernels, applications, or configuration files. Due to its simplicity, LOMAC itself requires no configuration, regardless of the users and applications present on the system. Although some features and fixes remain to be implemented, LOMAC presently provides sufficient protection to thwart some attacks, and is stable enough for everyday use.

Download Website Updated 23 Jan 2006 Suspend2

Screenshot
Pop 256.24
Vit 3.79

Suspend2 allows you to hibernate your machine without needing APM, BIOS, or ACPI support. It creates an image that is saved in your active swap partitions, swap files, ordinary files or (soon) across a network. At the next system boot, the kernel detects the saved image, restores the memory from it and then it continues to run as if you'd never powered down.

Screenshot

Project Spotlight

Screen Message

Fullscreen display of a short text.

Screenshot

Project Spotlight

PHP MIME Mail decoder class

A PHP class to decode email messages.