12 projects for "computer firewall" with 1 filter applied:

  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Automate contact and company data extraction Icon
    Automate contact and company data extraction

    Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.

    Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
    Explore Apify Store
  • 1
    Panzer Combat II

    Panzer Combat II

    Computer-assisted miniature tank game.

    Panzer Combat II is a multi-player voice and webcam enabled computer-assisted distributed miniature wargame of World War II tank combat. Firing is done by placing a webcam behind the aiming unit. Distance to target is computed using computer vision. Action inside the tanks is performed on the computer screen while battlefield strategy is played on the miniature terrain. Both camps can use a different laptop or tablet, the game will interconnect. You can try it online :...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    CACANMS is an acronym for Computer Aided Campus Area Network Management System. The system consists of software components and a library of about 60 classes. It is divided into three types of subsystems which reside on different servers and communicate.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    ISWYAD

    ISWYAD

    ISeeWhatYouAreDoing - a tool for remote acces with very! low bandwith.

    ISeeWhatYouAreDoing is a useful tool for getting screenshots and executing commands over Tcp/Ip or Ftp. Because it has NO security the Tcp/Ip part shouldn't be used in public networks (Use a firewall! :)). It was designed for easily keeping an eye on what people in your home network are doing and (if necessary) turn f.e. your brother's computer off when he forgot. As said it is able to work on very bad connections. Bin/Bin.zip is the basic package with client and a gui server, Bin/Hidden_Server.zip contains the "serious" version with a useful config.txt, no gui (server should run in background) and uses mainly ftp to get its commands, although you can connect via Tcp/Ip and the client from the Bin/Bin.zip or Bin/Client_Only.zip package. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    WhitewallManager

    Whitelist manager

    WhitewallManager is a whitelist manager. It aims to be a web based administration tool for administrators using a default-deny approach to the security of the network they are responsible for. Default-deny is a superior model for network security as compared to default-allow, which is how the security model of most local area networks is modeled. Default-deny disallows all but access granted to resources which you specifically allow. The advantage to this is that any new resources which...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Create and run cloud-based virtual machines. Icon
    Create and run cloud-based virtual machines.

    Secure and customizable compute service that lets you create and run virtual machines.

    Computing infrastructure in predefined or custom machine sizes to accelerate your cloud transformation. General purpose (E2, N1, N2, N2D) machines provide a good balance of price and performance. Compute optimized (C2) machines offer high-end vCPU performance for compute-intensive workloads. Memory optimized (M2) machines offer the highest memory and are great for in-memory databases. Accelerator optimized (A2) machines are based on the A100 GPU, for very demanding applications.
    Try for free
  • 5
    CD-ROM Firewall is a Red Hat/Centos (yum based install) based firewall that boots off a CD-ROM. Utilizing a headless, diskless computer it can provide services such as network address translation (NAT), virtual private network (VPN), ADSL connnectivity,
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    CartoReso intends to facilitate enterprise computer network mapping.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 7
    Secwatch is an intrusion detection system using log analysis to detect service scan and other brute-force attempts on a server or other computer using system logs and will create temporary firewall rules to block offending IPs
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    ghack ("grid hack") is meant to allow small groups of people to voluntarily share their computer resources to work on collective problems. Goals are: easy to use (e.g. scientific coders), easy to deploy (e.g. no elevated priviliges or open firewall ports
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    A java based network and firewall simulator that allows users to set and test the effectiveness of firewall rules using either a command line interface or graphical user interface.
    Downloads: 0 This Week
    Last Update:
    See Project
  • SIEM | API Security | Log Management Software Icon
    SIEM | API Security | Log Management Software

    AI-Powered Security and IT Operations Without Compromise.

    Built on the Graylog Platform, Graylog Security is the industry’s best-of-breed threat detection, investigation, and response (TDIR) solution. It simplifies analysts’ day-to-day cybersecurity activities with an unmatched workflow and user experience while simultaneously providing short- and long-term budget flexibility in the form of low total cost of ownership (TCO) that CISOs covet. With Graylog Security, security analysts can:
    Learn More
  • 10
    It moves by itself inside networks like virus infection & plagues, it is being written to solve computer virus problem drastically and responsibly. It is legal, free and open for public domain to improve W3 ICT Security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    OSA::net project main goal is to create an extensible, scalable framework for management of security related devices in middle-sized and large computer networks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    WebCheck is a simple device (computer, router, firewall) health status checking or monitoring over HTTP protocol. Very useful to keep track the status of of a multiple servers or workstation from remote location.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next