Discover Nintex Workflow Cloud - the fastest, easiest way to improve the way you do business. This state-of-the-art technology - built in the cloud, for the cloud - gives you the ability to create powerful, integrated workflows independent of any single platform. With our intuitive, drag-and-drop workflow design canvas, you can configure and deploy automated business processes with speed and simplicity. Try it today!Sponsored Listing
OSI-Approved Open Source (45)
- GNU General Public License version 2.0 (22)
- GNU Library or Lesser General Public License version 2.0 (9)
- Academic Free License (4)
- MIT License (4)
- Apache License V2.0 (3)
- BSD License (3)
- Adaptive Public License (1)
- Affero GNU Public License (1)
- Common Public License 1.0 (1)
- Mozilla Public License 1.0 (1)
- Qt Public License (1)
- Public Domain (5)
- Creative Commons Attribution License (1)
- Other License (1)
- Linux (45)
- Grouping and Descriptive Categories (35)
- BSD (26)
- Windows (25)
- Modern (20)
- Mac (19)
- Android (7)
- Other Operating Systems (4)
- Audio & Video
- Business & Enterprise
- Home & Education
- Science & Engineering
- Security & Utilities
- System Administration
This bot relays messages from one IRC network to another. It will relay messages on a channel to the same channel on other servers or to differently named channels. Can also relay private messages, topic changes, etc.
JIIS is a unix shell wrapper written entirely in perl, it adds the full feature set of perl to the standard commandline. Additionally there is a built in bot that performs equally well in two functions; as a help bot for new users, and as a memo system
LANmgmt is solution for more consistent, effective and automated network management. Multi-segment / multi-VLAN / multi-gateway / multi-IDS stackable switched ethernetworks are supported. Automatic configuration & inspecting of the ethernetwork.
Easily access more than 100,000 products and tools with our robust search engine. Manage your entire IT lifecycle from purchase to renewal all in one place — so you can get more done faster.Sponsored Listing
Catalyst based application intended to be a robot fitting tool, character planner, mining yield planner and eventually also a killboard/corporation management tool for Perpetuum Online. This is the base project, without any non-free data.
Project Naranja will uses Padlock Security of VIA EPIA mini-ITX motherboards in order to provide a toolkit to set up and use encrypted filesystems with Linux. NOTE: Files are now hosted at Google Code: http://code.google.com/p/naranja/
This code generates SURBL zone files, used to block spams based on message body URI domains which have been previously reported to SpamCop. SURBL is currently used by SpamCopURI, a SpamAssassin 2.63 plugin. Spam is well-marked with few false positives.
This is a small Linux rescue CD, suitable for booting systems that have become unbootable. Everything is loaded into RAM - once the machine has booted, you can remove the CD from the drive. It should fit into leftover CD space, eg on a business card
A PHP bot for IRC (runnable on the command line, but not from a webpage)
ThousandEyes extends visibility across corporate networks as well as the public Internet, helping to solve issues from the branch through MPLS links and SIP trunks to service provider networks. Simulate pre-deployment capacity, monitor detailed performance metrics and see how QoS settings impact call quality.Sponsored Listing
The TAG Report Management System is a series of PERL scripts and modules which provide a framework for the management of report generation by different log analysis packages.
A live-CD desktop GNU/Linux distribution based on Debian with a focus on convenience of use.
Vald a Module-Based CMS specially designed for my personal needs. Vald consists of a normal CMS and an extended Serveradmin-Panel for managing Linux-Based Servers. It's main goals are to be secure and easy to handle.
A Interactive Network VideoGame
Some of my ideas that I would like to share with others.
The book shows you how architecting a modern security visibility infrastructure can help your business adapt to new threats, lengthen the usefulness of your current security investments, and optimize uptime and availability. See the entire threat landscape, understand security visibility basics, support both inline and out-of-band security systems, explore security visibility use cases and ask the right questions about visibility.Sponsored Listing
*********************************** ALERT:Otto has been revived in a new version! See it at http://ottojukebox.com *********************************** otto is a web based mp3 database and jukebox which can gracefully organize a very large number of albums. it is suitable for home or office workgroup use, or as an interface to a streaming internet 'radio' station.
A Makefile skeleton that includes configuring. Fed up with the autoconf tools? The pConf system is a small, clean make file skeleton that can do configuring tasks and works for different OS environments. Supports C, C++. Documentation (s)POD.
An intuitive GUI (GTK-based) for PostgreSQL management in under 100K (zipped).
PHP and MySQL driven backend for adding additional Web based functionality to the EatWatch for PalmOS diet planning and weight logging package.
RABL - Repeatable shell environment. Shell script providing various repeatable functionality as a library of reusable functions. Automates option parsing, usage messages, prompting, and various other utility functions. Currently targets GNU bash.
With Infoblox DDI, your IT teams can consolidate DNS, DHCP, IP address management, & other core network services into a single platform. Orchestrate DDI functions for hybrid & public cloud & virtual & private cloud environments and access rich reporting & analytics capabilities for capacity planning, asset management, compliance control, & auditing. Boost IT efficiency & automation with seamless RESTful API integration.Sponsored Listing
RPM packages of CPAN Perl Modules
Tools to create advanced security databases from Xml files.