Get your domain at wholesale price. Cloudflare offers simple, secure registration with no markups, plus free DNS, CDN, and SSL integration.
Register or renew your domain and pay only what we pay. No markups, hidden fees, or surprise add-ons. Choose from over 400 TLDs (.com, .ai, .dev). Every domain is integrated with Cloudflare's industry-leading DNS, CDN, and free SSL to make your site faster and more secure. Simple, secure, at-cost domain registration.
Sign up for free
Gen AI apps are built with MongoDB Atlas
Build gen AI apps with an all-in-one modern database: MongoDB Atlas
MongoDB Atlas provides built-in vector search and a flexible document model so developers can build, scale, and run gen AI apps without stitching together multiple databases. From LLM integration to semantic search, Atlas simplifies your AI architecture—and it’s free to get started.
ClusterNFS allows diskless clients to share a single root filesystem
by matching "interpreted" file names of the form
"/path/filename$$KEY=value$$" with fallback to the original filename.
Keys include HOSTNAME, IP, UID, GID, and CLIENT (always matches
jdu is a graphical front-end for the output generated by the du program. du reports the disk usage of a particular directory tree by recursively summarizing how much disk space is used by the sub-directories of the chosen root directory.
Logpecker is a tool for syslog files like /var/log/messages. More flexible than a simple regexp matcher, you can use syslog facility and priority. Messages that appear too often are sieved out. Generates root-tail tickers, reports, active event lists
Bootdisk lets you create boot and root disks for booting linux. These disks should permit rescue when normal boot is no more available. Bootdisk makes possible quick tests adjusting your set of utilities.
CoolPackager is a program which will take a .tar.gz file and a installation script file and create a self-extracting executable scipt.
Install it on your system by typing this command as root:
lynx -source cpkg.sourceforge.net/cpkg | sh
This script attempts to add accountability for accounts used by multiple users. This is found most commonly where more than one admin uses root. This is NOT intended to be a security program! Admins are by nature lazy about documentation. This is to g
This is a PC network-cloning Toolbox. It is a mix of some usefull things found on internet lyke byld,e3 or buzzybox. It provide a way to make a set of floppy disk : a boot-disk and a root disk based on your running kernel.....
The Linux Intrusion Detection System is a patch which enhances the kernel's security. When it's in effect, many system administration operations can be made impossible even for root. You can turn the security protection on or off online and you can hide
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Remotely Execute Commands in an Alias File On the Host
This software consists of a client and a server. The server will run a command if it is specified in the server side alias file.
The alias file syntax:
!Settings
alias 'command cmd-args cmd-args'; user2run-cmd-as
Example:
!EnableOutput yes
!Port 2012
!Verbosity warnings
update 'yum makecache && yum update'; root
filedbupdate updatedb; root
who_is_logged_on 'who'; *
Then the client would run:
./recafoh host -p 2012 -c update --warnings
and it would output yum's output.
*NOTE...