MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
Start Free
Simple, Secure Domain Registration
Get your domain at wholesale price. Cloudflare offers simple, secure registration with no markups, plus free DNS, CDN, and SSL integration.
Register or renew your domain and pay only what we pay. No markups, hidden fees, or surprise add-ons. Choose from over 400 TLDs (.com, .ai, .dev). Every domain is integrated with Cloudflare's industry-leading DNS, CDN, and free SSL to make your site faster and more secure. Simple, secure, at-cost domain registration.
This project intends to build a complete CallerID-function for home- or small buisniess environments. It depends on simple hardware which everyone can build. It will present the incomming call's number on every workstation on the network.
tcpick is a textmode sniffer; it tracks tcp streams, shows the status, reassembles and saves the data captured in files or displays them in the terminal in different modes (ascii, hex..). There is a color-mode. Useful to get files passively.
General line based buffer with backlog written in "C". It supports multiple input and a single output. I/O modules: TCP/IP, UDP/IP, Unix sockets, File/Pipe. It supports backlog writing (and resume) so a failsafe transport-buffer can be build.
Log common Windows trojan attempts (and optionally emulate the trojan).
*This project is not actively maintained, and the software is of little use today.*
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Daemon to sit between NAS and RADACCT server and provide an automated spooling service of Accounting information should the server fail to respond. Helps reduce impact of temporary failure of single accounting server
S.M.A.R.T. Linux is a bootable floppy distribution containing tool (smartmontools) for monitoring IDE/SCSI hard disks (using Self-Monitoring, Analysis and Reporting Technology). It is based on Slackware Linux.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
The Looper Event / Alert System is an application primarily used for network management to perform alert monitoring and redirection. It is designed with extreme simplicity in mind and is highly modularized. Also used as a Netcool probe or gqateway.
YAML (tm) is a straight-forward data serilization language, offering an alternative to XML where markup (named lists and mixed content) are not needed. YAML borrows ideas from rfc822, SAX, C, HTML, Perl, and Python.
Nasty LKM Defender is a module wich protects Your system against some nasty modules (e.g. rootkits).
Well mainly it protects sys_call_table and some other important functions (get_module_list, sys_query_module)
CTrace is a multi-threaded trace debug library written in C. It provides a simple, fast, well documented trace utility for applications and as such is especially suitable for use in real-time embedded applications.
Automated Security Tools (autosec) aims to provide
automatic tools which network administrators may use
to help check and test the security of their network.
Output spool reader for Snort! This program decouples output overhead from the Snort network intrusion detection system and allows Snort to run at full speed. It takes input and output plugins and can therefore be used to convert almost any spooled fil
sldb is the embedded database for syslog. It captures log messages to a disk-backed database, and sorts them by user-defined subject. Excess messages from each bin are pruned on a first-in, first out basis.
Loggy is a Linux Advanced Logcleaner and a tool to hide you in a linux machine
by cleaning or modifing the intruder's ip from all the logfiles in /var
bin and txt logs it find logs, with a recursive search in /var/log and a lot of fantastic features
xrootconsole tails a file in a window on your X11 root window. It aims to be as simple and resource-light as possible, within reason: it should run smootlhy on a P133 laptop. The program is non-interactive; all configuration is done on the command line.
SETILog saves some statistics of a completed SETI@home work-unit in a text CSV file. This file is needed by SETIWatch to keep track of the completed workunits.
This is a simple utility to track the amount of time a
PC is used.
It can the used to determine
1. whether PCs are being used optimally, e.g. internet cafe's.
2. productivity (similar to punchcards).
3. sleep/wake cycles or bipolar cycles.
Logcheck is software package that is designed to automatically run and check
system log files for security violations and unusual activity. Logcheck
utilizes a program called logtail that remembers the last position it read
from in a log file.