Network slow but you don't know the cause? Use Bandwidth Analyzer Pack (BAP) to monitor and analyze network bandwidth performance and traffic patterns. With BAP you can identify which users, applications, and protocols are consuming the most bandwidth. You can also monitor Wireless LAN Controller traffic to see what applications and clients are using your wireless network. Try it free for 30 days!Advertisement
OSI-Approved Open Source (197)
- Academic Free License (1)
- Apache License V2.0 (12)
- Apache Software License (2)
- Artistic License (4)
- BSD License (34)
- GNU General Public License version 2.0 (97)
- GNU General Public License version 3.0 (23)
- GNU Library or Lesser General Public License version 2.0 (33)
- GNU Library or Lesser General Public License version 3.0 (5)
- MIT License (14)
- Nethack General Public License (1)
- Open Software License 3.0 (1)
- Python Software Foundation License (1)
- zlib/libpng License (1)
- Public Domain (8)
- Other License (7)
- Creative Commons Attribution License (2)
- Linux (209)
Grouping and Descriptive Categories (149)
- 32-bit MS Windows (95/98) (2)
- 32-bit MS Windows (NT/2000/XP) (15)
- 64-bit MS Windows (9)
- All 32-bit MS Windows (31)
- All BSD Platforms (15)
- All POSIX (101)
- OS Independent (24)
- OS Portable (26)
- Project is OS Distribution-Specific (1)
- Project is an Operating System Distribution (6)
- Project is an Operating System Kernel (2)
- Windows (123)
- BSD (109)
- Mac (102)
- Modern (89)
- Android (46)
- Audio & Video
- Business & Enterprise
- Home & Education
- Science & Engineering
- Security & Utilities
- System Administration
The Solitox Community system provides an integrated real-time chat service, web interface, and a scalable infrastructure for adding more services with common credentials. These interfaces allow a greater level of communication for your users.
The service is found at http://newdev.ariel-networks.com/rmsnr/ "Stallman Number" is known as "Six Degrees of Richard M. Stallman". Programmers make cooperation and the number of links between a developer and Mr. Stallman is "Stallman Number".
TIDAL is a collection of data acquisition and processing tools for research in respiratory physiology. It provides a high-level language for specifying experimental protocols and required computations.
ThousandEyes extends visibility across corporate networks as well as the public Internet, helping to solve issues from the branch through MPLS links and SIP trunks to service provider networks. Simulate pre-deployment capacity, monitor detailed performance metrics and see how QoS settings impact call quality.Advertisement
Tara is a (hopefully) elegant and concise N-body integrator written in Ruby with C extensions.
A software distribution based on Debian/Linux to provide network diagnostics, security monitoring and intrusion detection. The distribution can be easily installed by office personnell.
The Akari Project is developing an online, 3D, real time strategy game for Windows and Linux.
Firmware for a fully programmable keyboard using Atmel's AT90xxUSB chip.
Lich is a cross-platform multithreaded interpreter meant exclusively for use with text-based MUDs. The application natively supports the Ruby language as well as the Simutronics "Wizard" script standard including their StormFront expansions.
Easily access more than 100,000 products and tools with our robust search engine. Manage your entire IT lifecycle from purchase to renewal all in one place — so you can get more done faster.Advertisement
The Multi-User Environment Server game engine is a multithreaded event-driven internet game environment server written in Ruby and C.
What is a Protocol Debugger? Conditionally break based on BPF filters, modify protocol contents on the fly. Build custom actions that let you manipulate how you speak on the network. Or manually edit protocol fields and send the packets along.
A Linux distro for Vietnamese
Tinara is a media production system, currently composed of a basic revision control and archival system (DaMarcus), a build system (Alice), an audio playback engine (Tape), and a graphical audio recording and editing application.
An experimental concatenative programming language founded on the unholy trinity of Forth, Lisp and RDF triples.
AlienVault® Unified Security Management™ (USM™) is an innovative approach to security monitoring, delivered in a unified platform. The USM platform includes five essential security capabilities that provide resource-constrained organizations with everything they need for effective threat detection, incident response, and compliance management, in a single pane of glass.Advertisement
This project aims to make such Open Source utilities by which one can shoot any problem with/without having technical knowledge/skills.Tuxguru's Rescue tablet resolves many problems including Passwords,Grub,Backup,Recovery,Partition,Installations,etc..
VectorSection is a universal vector graphics translator. It is a group of loosely-coupled programs which can be used in scripting and as import/export plugins for graphical CAD/vector editor programs.
Venom is a small framework for writing 3d games and applications.
Vilari is a Gtk based webbrowser using WebKit (see http://webkit.org)
Wireless Hackers Exploitation and Audit Toolkit is a metasploit like framework for Bluetooth and Wifi environments.
Whatzit provides a system for using error and status conditions much more rich than the canonical 'zero means success, anything else is situational' mechanism. You can tell the severity of a condition and where it originated by looking at its value.
XCAST6 is an implementation of XCAST over IPv6. XCAST is a new, flexible scheme for multicast suitable for a very large number of groups.
XIC is a full featured, cross platform IRC client. There are both graphical and CLI versions planned, as well as various language versions.
ZK Light is renamed to ZKuery and moved to http://code.google.com/p/zkuery/. ZK Light is a client-only version of ZK; Support Java, C, PHP, Python...
Scriptable frontend for media applications.
b0ss1X is a full featured Linux Distro created by Kasper5150 and Novalok from Backslash Security Group. It is used for network audits and network administration.
Capstone disassembly engine