Enterprise Auth, Zero Friction: Any Framework • 30+ SDKs • Universal Login
Production-ready login in 10 lines of code. SSO, MFA & social auth included. Scale seamlessly beyond free tier with Okta’s enterprise security.
Get Your API Keys
Payroll Services for Small Businesses | QuickBooks
Save 50% off for 3 months with QuickBooks Payroll when you Buy Now
Easily pay your team and access powerful tools, employee benefits, and supportive experts with the #1 online payroll service provider. Manage payroll and access HR and employee services in one place. Pay your team automatically once your payroll setup is complete. We'll calculate, file, and pay your payroll taxes automatically.
Bruteblock allows system administrators to block various bruteforce attacks on UNIX services. The program analyzes system logs and adds attacker's IP into IPFW table effectively blocking them. Addresses are removed from the table after expiration period
A Port Knocking C-based server & client. Stealth mode by closed ports, strong encryption (ARC4 & BlowFish), Daemon mode, compresed sequence, MD5 digest log check, user passwords and user privelege system, action triggers... GPL license.
Gardol monitors system log files to detect denial of service and other attacks and blocks attacking sites with Linux iptables. Attack detection rules may be programmed in Perl.
A statistical view of the recorded activity on a Honeynet. A mechanism for a honeynet to present some information about its findings over the web. This is done by a statistical analysis on the inbound firewall logs recorded by the honeynet's firewall.
The Titan Firewall is an interface Web to manage firewall based on Linux with iptables. It supports filtrate of packages, NAT, logs, VPN's... Implemented in Java and jsp.
IASON is designed to analyze DNS, log files and data streams. IASON works in conjunction with a network firewall and IDS (Intrusion Detection System) software to block attacks while allowing legitimate requests to reach a domain name server.
LogCop is a set of turn-key bash/firewall/awk scripts for enhancing an IDS. It monitors system logs and blocks IP addresses based on such criteria as illegal user names from repeated attacks. In production under Linux, FreeBSD, OS X, Solaris.
IP Traffic Volume: Logs (counts) in- & outgoing bytes through network device(s) using kernel iptables. Highly configurable as to which bytes are logged, e.g. to/from specific ports or ip-addresses. Data displayed in html via cgi or plain ascii to console
216,000+ customers in over 135 countries grow their businesses with HubSpot
HubSpot is an AI-powered customer platform with all the software, integrations, and resources you need to connect your marketing, sales, and customer service. HubSpot's connected platform enables you to grow your business faster by focusing on what matters most: your customers.
FwPlatinum provides real time data analysis of CheckPoint FireWall-1 connection logs. Data is stored for up to 2 years, and is accessed by CGI generated graphs which can drill down to the specific time that you are interested in.
Green Screen: A Linux based Advanced Syslog Server for Juniper NetScreen Firewalls - Can be expanded later to support other products. It can capture syslog messages, parse them, store them in a MySQL database. A Web GUI interface is also included.
Loganalyzer for Windows XP Firewall and Linux Iptables firewall. Generates a nice html document with statistics from all the pakets captured by the firewall. The program is written in Python and has an (optional) graphical interface.
FWReport is a log parser and reporting tool for IPTables. It generates daily and monthy summaries of the log files, allowing the admin to free up substantial time, maintain better control over security of the network, and reduce unnoticed attacks.
Netscreen FirewallLog Analyser which can analyse log files in Netscreen Log File format and copy data into Access Database. Developed by Specialists for Computer Systems (SCS)
Traffic Control is a Linux toolbox to control squid, NAT, and other
services traffic limits. TF uses Linux iptables to count traffic.
This utility consists of two parts. The first is server side
(written in Perl) and the second part is the interface.
PACIE (Perl Analysis Console for Intrusion Events) Attempts to be a complete replacement for ACID. Place this cgi script on your internal webserver and receive powerfull reporting on your current snort database.
Pothos is an iptables log analyzer. It is used to interpret, in a user-friendly fashion, the logs that ulogd creates with it's MySQL plugin. It's main objective is to be efficient, leaving as small a foot-print as possible.
The p2p_grab script will make a log which is useful to generate an IP list. This list is inserted in cbq to shape the bandwidth for the users that use P2P programs. Also the IP list can be inserted in an iptables firewall script...
myNetWatchman Perl Agent is a program that is designed to capture rejected packet information from various firewall logs and forward this attack information to central analysis servers at myNetWatchman.com.
The firewall traffic counter are scripts which are parsing iptables output and writing it to a log file. A PHP script displays grahpical on-the-fly statistics about traffic (summary,email and gameserver traffic). Monthly, daily reporting supported.
ModLogAn is a modular logfile analyzer which is able to generate reports based on 15 different inputformat from variuos sections (http, ftp, mail, firewall, isdn, ...). As a special feature it can combine multiple inputfiles from clustered servers.
This is a program that watches your system log files, looking for hack attempts. It instanty reacts to potential security breaches by (for instance) adding firewall rules to cut off the attacker.
a linux netfilter/iptables firewalllog summarizer with graphical and command line interface that helps the sysadmin in his daily routine. points of interest can be examined closer to gain further information. you can also run it in command line mode and