This product is no longer maintained:
The author created alternative tools: https://databunker.org/ and https://privacybunker.io/
GreenSQL is a database firewall engine used to protect Open Source Databases from SQL injection attacks. It works in proxy mode. Application logic is based on evaluating of SQL commands using risk score factors, as well as blocking of sensitive commands
Server/client suite which provides per-user access control/firewall/QOS. Robust and high speed implementation is secure against MAC/IP spoofing, and can scale to large networks with many clients. Options for additional monitoring and captive portal.
This is an NIDS/HIDS, Network plus Host based Intrusion Detection System. Este é um NIDS / HIDS, Sistema de Detecção de Invasões Baseado em Redes e em Máquinas.
IP-Updater is a Perl-Script to manage dynamic IP-adresses (DynDNS). It reads the IP via Telnet from the Router (Zyxel, Netgear) or get it from the web. Different updates to Dyn-IP-Services or FTP-Upload to a hompage are possible. With logging.
Lomalarga is a VPN-like service based on SSH and Linux.
Lomalarga is a port forwarding (VPN-like) service based on SSH & Linux. Based entirely on open source. The client is written in C# and the administration is based on Linux/lighttpd/PostgreSQL/PHP, with the UI written with Google Web Toolkit.
BASE is the Basic Analysis and Security Engine. It is based on the code from the Analysis Console for Intrusion Databases (ACID) project. This application provides a web front-end to query and analyze the alerts coming from a SNORT IDS system.
The WiFi Guard Dog project is a complete and embeddable captive portal solution for wireless community groups or individuals who wish to open free HotSpots while preventing abuse of their connection. Go to dev.wifidog.org to download the latest version.
NetAccess is an application for managing a gateway linux server through a web-based interface. It can be used to change the network settings, to limit the bandwidth, to limit the computers that can get internet access (by checking their MAC), etc.
Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Nuri is a pool of functions useful in complex network&devices management, almost tied on Cisco HW. She will help you in analysis and maintenance of very huge configs and/or topological complex networks. have fun. $witch
M0n0wall currently doesn't support IPSEC VPN where one or both ends are dynamic IP addresses. This PHP script along with the dynamic DNS service built into m0n0wall, auto-updates the remote gateway IP address in the VPN configuration.
Web reverse proxy for Single Sign On (SSO). It can apply a security policy (profiles stored in a LDAP directory) to an existing set of applications, consolidate websites, encrypt all communications, rewrite simple URLs...
An all-in-one Linux firewall/gateway distribution which features an easy to use yet powerful web based management console. Created to be a unified threat management system to protect and defend a network. Uses Zend Framework heavily
Valkyrja (Php Firewall front-end) is a web-based tool to administrate a linux firewall based on iptables. Valkyrja is modular, everyone can write a component for it. As Soon as possible: squid manage, NAT manage
What are the packets rejected by your Netfilter based firewall today ? How often this suspicious host try to connect to your box ? What are the most rejected domains ? Who is this strange host which scan your ports ?
The responses are in the iptables log
The package includes tools that make a fully functional user accounting system for a small ISP. Functionality includes: traffic shaping, management of users' accounts, firewall, network monitoring, link quality measurement, alert system, etc.
A firewall is used to control access to services (eg proxy) depending on the time of day, the day and the hosts the requests come from -- as the need may arise in a school or university. A web interface delegates control of activation to authorized users.