OSI-Approved Open Source (397)
- Academic Free License (4)
- Affero GNU Public License (1)
- Apache License V2.0 (8)
- Apache Software License (3)
- Apple Public Source License (1)
- Artistic License (8)
- BSD License (52)
- Common Development and Distribution License (1)
- Common Public License 1.0 (2)
- GNU General Public License version 2.0 (291)
- GNU General Public License version 3.0 (28)
- GNU Library or Lesser General Public License version 2.0 (33)
- GNU Library or Lesser General Public License version 3.0 (4)
- IBM Public License (1)
- ISC License (2)
- Other License (19)
- Public Domain (16)
- Creative Commons Attribution License (5)
- Linux (411)
Grouping and Descriptive Categories (320)
- 32-bit MS Windows (95/98) (6)
- 32-bit MS Windows (NT/2000/XP) (11)
- 64-bit MS Windows (5)
- All 32-bit MS Windows (33)
- All BSD Platforms (52)
- All POSIX (272)
- OS Independent (59)
- OS Portable (15)
- Project is OS Distribution-Specific (5)
- Project is an Operating System Distribution (5)
- Project is an Operating System Kernel (2)
- BSD (264)
- Modern (254)
- Mac (138)
- Windows (113)
- Other Operating Systems (28)
- Solaris (28)
- Audio & Video
- Business & Enterprise
- Home & Education
- Science & Engineering
- Security & Utilities
- System Administration
IXA is a server-client system for collaborative software development and testing.
The kernel network stack may behave not as expected, especially in the case of receiving packets. With Ianus it is possible to bypass the kernel network stack and to develop your own network stack in user space or other tools.
IceIDS is heuristic Network Intrusion Detection System (NIDS) based on calculating Student's distributions of network traffic.1 weekly downloads
This is another ip/host blockeer used to create blocking entries in both the hosts.allow file, and also pf tables. Blcoks are built on illigal logins and also final block log entries from hosts.allow. The ability to pull in external blacklists once a day
Informator is a system residing on an Internet Gateway to send pop-up messages via Web Browser to a specific host on LAN. That could be useful for Internet Service Providers if they need to send some informations to their customers.
Replicates POSIX user credentials over the Internet - NIS replacement
The JACAL Project is a suite of programs, scripts, guidelines, protocols, documentation, diskettes, etc. that assist in quick, network based loads/builds of machines.
A complete OpenSource Network Management System Is SNMP-Standard Oriented (tested on Cisco and Linux). It Integrates Syslog, Tacacs, RRDtool (Performance Graphs), Maps, Traps, TFTP, Autodiscovery, Sound Alerts, AAA, Modular and Extensible.28 weekly downloads
Object storage is clearly the simplest, most flexible, and most scalable way to store tons of unstructured content. Scality’s Zenko.io enables developers and businesses to take advantage of this simplicity, for free. Whether you're programming in Go or Java, or whether you're using existing applications for personal or shared data management, Scality’s Zenko.io is a great starting point.Advertisement
JMrTools, is inspired by the MrTools Perl Project (Written by Robert Marino). This JAVA project implements ssh telnet, scp, rsync, sftp, ftp, and stdio. Providing execution/transfer of commands, script, or files on Multiple hosts concurrently.
This package provides a library and applications for an JAVA implementation of the "Message Bus for Local Coordination" (RFC 3259). The included files consists of the necessary jar-files and the optionally needed native libraries for gcj.
Asterisk-Java Middleware is a project that aims to create a common Java RMI interface using the Asterisk-Java classes.
Utility to extract unique java exceptions4 weekly downloads
pgjobs is a mechanism for scheduling and executing stored procedures under PostgreSQL database server.
jondz' picture organizer
Core library for complex software project development. Features: semaphores, services, finite state machine, framework, utilities related to the middleware architecture and implementation.
Junksurf is browsing automaticly to adulterate your interests
Obsolete, Time-Machine like utility for Macintosh
KeepItSimple: organize&integrate your tools in a non-/interactive menu
Kerbeschutz is an automated system designed to parse system logs for attempted hacking and DoS attempts and automatically blocks the hacker
Keypress monitors the time a user spends on his computer. Keypress is intended as an overall worktime monitoring program, the user can follow his worktime on monthly basis. Includes a daemon, command line ui plus a gnome 2 ui (GTK 2).3 weekly downloads
The purpose of the KiDNaP project is to allow the resources of a "remote" machine to be accessed transparently by applications running on a "local" machine. For example, if an application running on server A wishes to open the floppy device, the open sys
Admin, Backup, (Mirror) Cache, (re)Deploy, Embed (wizard), Migrate
Naraio is LAMP like software. It contains Apache, MySQL, PHP, Perl, Openssl, Phpmyadmin, OpenLDAP, Subversion, Ruby, Python, Phpldapadmin, and Trac. Trac and Subversion are authenticates user with integrated ldap. Naraio is easy, secure and flexible.1 weekly downloads
To provide systems which will reduce the cost of ownership of Linux in enterprise environments, through automation of optimization, security, configuration and documentation.
By usage of CPUFreq, ACPI, HDDTemp and internal functions, LACH daemon is able to reduce power consuption in a laptop by scaling both CPU as GPU (Radeon only), as HDD. Also checks for thermal overheat for the sake of laptop health.