Showing 3 open source projects for "intrusion and detection and system"

View related business solutions
  • Auth0 Free: 25K MAUs + 5-Min Setup Icon
    Auth0 Free: 25K MAUs + 5-Min Setup

    Enterprise Auth, Zero Friction: Any Framework • 30+ SDKs • Universal Login

    Production-ready login in 10 lines of code. SSO, MFA & social auth included. Scale seamlessly beyond free tier with Okta’s enterprise security.
    Get Your API Keys
  • Deliver secure remote access with OpenVPN. Icon
    Deliver secure remote access with OpenVPN.

    Trusted by nearly 20,000 customers worldwide, and all major cloud providers.

    OpenVPN's products provide scalable, secure remote access — giving complete freedom to your employees to work outside the office while securely accessing SaaS, the internet, and company resources.
    Get started — no credit card required.
  • 1
    SysMate - Hosts File Walker

    SysMate - Hosts File Walker

    Powerful, lightweight and portable Windows Hosts File Editor

    SysMate - Hosts File Walker is an approachable and portable software application that facilitates a user-friendly working environment for helping you manage the Hosts file. You don't need to care about the hosts file. SysMate - Host File Walker has been designed to cater for the hosts's file structure, entry insertion and DNS to IP conversion. So you don't need to know the IP of either the DNS you are diverting from or the one you are porting to. SHFW automatically resolves the IP, detects...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    IP change detection script for UNIX systems. Can be used to map static domain to dynamic IP. Works behind NAT. Uses HTTP browser or network interface to get public IP. To be used with task scheduler (Cron or like, sample crontab file shipped).
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    IASON is designed to analyze DNS, log files and data streams. IASON works in conjunction with a network firewall and IDS (Intrusion Detection System) software to block attacks while allowing legitimate requests to reach a domain name server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next