Showing 4 open source projects for "attacks"

View related business solutions
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • Regpack: All-in-One Online Registration and Payment Software Icon
    Regpack: All-in-One Online Registration and Payment Software

    For camps, courses, virtual classes, client billing, events, conferences, meetings, afterschool programs, educational travel, retreats

    Regpack is a powerful onboarding, registration, and payments platform trusted by thousands of organizations worldwide. Our mission is simple: to give you the tools to automate busywork, streamline your processes, and keep your focus where it belongs, on growing your programs and serving your clients.
    Learn More
  • 1
    Druid

    Druid

    Database connection pool written in Java

    ...Druid provides a monitoring feature that can be implemented through filter-chain. It also comes with WallFilter, that is based on the SQL semantic analysis to protect from SQL injection attacks. Monitor connection leaks and connect to other databases, like Oracle database.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Cyber

    Cyber

    Semantic non-deterministic Superintelligence consensus computer

    ...There are however at least 3 problems associated with the above-mentioned implementations. (1) the subjective nature of relevance, (2) difficulty in scaling consensus computers for over-sized knowledge graphs, (3) the lack of quality amongst such knowledge graphs. They are prone to various surface attacks, such as sybil attacks, and the selfish behavior of the interacting agents. In this document, we define a protocol framework for provable consensus computing of relevance, between content-addresable objects, which can be computed on GPUs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Pget

    Pget

    The fastest, resumable file download client

    Multi-Connection Download using parallel requests. This program comes with no warranty. You must use this program at your own risk.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Privale is a p2p network following the form of onion routing/mixmaster networks. But, it is an anonymous publish and retrieval medium, not a proxy system. Privale attempts to defend against denial of service attacks, Sybil attacks, and traffic analysis
    Downloads: 0 This Week
    Last Update:
    See Project
  • Email Authentication Problems Solved by EasyDMARC Icon
    Email Authentication Problems Solved by EasyDMARC

    For companies that need a SaaS platform to implement and monitor DMARC, DKIM, SPF, and BIMI

    Thousands of IT Managers and Sysadmins use EasyDMARC every day to manage, monitor, and secure email infrastructure.
    Learn More
  • Previous
  • You're on page 1
  • Next