216,000+ customers in over 135 countries grow their businesses with HubSpot
Think CRM software is just about contact management? Think again. HubSpot CRM has free tools for everyone on your team, and it’s 100% free. Here’s how our free CRM solution makes your job easier.
Get free CRM
Deliver secure remote access with OpenVPN.
Trusted by nearly 20,000 customers worldwide, and all major cloud providers.
OpenVPN's products provide scalable, secure remote access — giving complete freedom to your employees to work outside the office while securely accessing SaaS, the internet, and company resources.
CIDSS - Common IntrusionDetection Signatures Standard – is our standard based on experiences due to tries of automatic translating signatures various companies. CIDSS is now the most extensible language that can describe network intrusions.
Siganture Translator is a Java application which can translate signatures between different IDS's and Common IntrusionDetection Signatures Standard (CIDSS).
WARNING: Project moved to http://github.com/plashchynski/viewssld viewssld is a free and open source non-terminating SSLv2/SSLv3/TLS traffic decryption daemon for Snort and other Network IntrusionDetection Systems (IDS).
Payroll Services for Small Businesses | QuickBooks
Save 50% off for 3 months with QuickBooks Payroll when you Buy Now
Easily pay your team and access powerful tools, employee benefits, and supportive experts with the #1 online payroll service provider. Manage payroll and access HR and employee services in one place. Pay your team automatically once your payroll setup is complete. We'll calculate, file, and pay your payroll taxes automatically.
Software repository of the hack://src project. Includes security related software for crypto, vulnerability/patch notification & management, and ultra low level system access for stealth forensics & intrusiondetection or malware removal.
devialog is a behavior/anomaly-based syslog intrusiondetection system which detects unknown attacks via anomalies in syslog. It can generate signatures for ease of management, act upon anomalies in a predefined fashion or perform as a standard log parser
Trinux is a small ramdisk/floppy based Linux distribution that contains useful tools for mapping and monitoring TCP/IP networks (i.e. intrusiondetection and vulnerability scanning)
GNUWire is a centrally managed, multi threaded file integrity checker / intrusiondetection tool. It was written from the ground up with security, portability, scalability, performance and user interface in mind.
PyIDS is an intrusiondetection system whose aim is to provide concise information to administrators about some parts of the system i.e filesystem checksums, unknown connections to the machine, access control lists of special files, log revision...
Secwatch is an intrusiondetection system using log analysis to detect service scan and other brute-force attempts on a server or other computer using system logs and will create temporary firewall rules to block offending IPs
EIS is an Intrusiondetection system that gathers local "client" accounting information, compares it to known vulnerabilities and notifies the appropriate people when there is a comprimise in security.
The Bro Re-usable Architecture (BRA) is a project by Christopher Jay Manders that will allow one, with minimal effort, to set up a working Bro (real-time intrusiondetection) environment.
Ida, is a Apache log security analyzer written in PHP. It will scan Apache logs and report about security incidents like SQL injections, XSS attacks, path traveling and so on.
PSeudo terminal IntrusionDetection System.
The kernel part plugs into terminal processing subsystem and logs hashed terminal lines.
The user part reads these, consults a list of allowed entries, and takes appropriate action upon unexpected lines.
wIDSard is an host based IntrusionDetection System.
It intercepts syscalls made by the process to monitor at user level
by the ptrace mechanism. It can detect not only single system calls, but even
sequences, ripetition, negation ecc.
IASON is designed to analyze DNS, log files and data streams. IASON works in conjunction with a network firewall and IDS (IntrusionDetection System) software to block attacks while allowing legitimate requests to reach a domain name server.
The Network Security Response Framework (NSRF) allows for testing different computer security response engines and methodologies. It supports simulated and real: IntrusionDetection Systems (sensors), Attacks, and Responses.
Templario is a security event audit and compliance suite which helps you to monitor enterprise security from one central console. Templario automates and consolidates complicated enterprise network security auditing and requires near-zero administration.
M-ICE is a modular hostbased intrusiondetection framework. It is used as middleware to close the gap between IDS research and IDS development. M-ICE consists of various parts that can be connected together by using network-or interprocess-communication
IDSRG stands for "IntrusionDetection System Report Generator". It generates graphic reports from a snort database of alerts. The main goal of the project is to provide instant reports of your ids events. It has 7 predefined reports and the plans are t