Showing 10 open source projects for "block"

View related business solutions
  • Achieve perfect load balancing with a flexible Open Source Load Balancer Icon
    Achieve perfect load balancing with a flexible Open Source Load Balancer

    Take advantage of Open Source Load Balancer to elevate your business security and IT infrastructure with a custom ADC Solution.

    Boost application security and continuity with SKUDONET ADC, our Open Source Load Balancer, that maximizes IT infrastructure flexibility. Additionally, save up to $470 K per incident with AI and SKUDONET solutions, further enhancing your organization’s risk management and cost-efficiency strategies.
  • Business Continuity Solutions | ConnectWise BCDR Icon
    Business Continuity Solutions | ConnectWise BCDR

    Build a foundation for data security and disaster recovery to fit your clients’ needs no matter the budget.

    Whether natural disaster, cyberattack, or plain-old human error, data can disappear in the blink of an eye. ConnectWise BCDR (formerly Recover) delivers reliable and secure backup and disaster recovery backed by powerful automation and a 24/7 NOC to get your clients back to work in minutes, not days.
  • 1
    SSHGuard

    SSHGuard

    Intelligently block brute-force attacks by aggregating system logs

    SSHGuard protects hosts from brute-force attacks against SSH and other services. It aggregates system logs and blocks repeat offenders using several firewall backends, including iptables, ipfw, and pf.
    Leader badge
    Downloads: 96 This Week
    Last Update:
    See Project
  • 2
    Bubbles

    Bubbles

    Bubbles the simple, easy to use HTTP web server

    ..., accepting contact form submissions with support for Spam Guard, and recording site activity as date stamped traffic logs. She also includes a built-in log analyser for making sense of her traffic logs. These and other features make her more than capable of running multiple websites with little to no headache. Her design is light and stable, and an extensive block-based memory management system ensures all her key operations use memory in a sustained and reliable manner. Version: 3.00.9240
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    cravlAndBlock

    linux tool to improve server security

    cravlAndBlock is simple java application that cravl error log file of Your web server and add all attacker IPs. I.E. All Modsecure entries, scans and so on. Every bad IP will be added to hosts.deny file with ALL prefix. For sure it will not block all atacks but it will help. How it works: use cron to start java cravlAndBlock.jar in the same folder add properties.xml (I addes sample properties.xml file). And thats all. Program will start from cron, read properties file and make backup...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Blocks the IP number of SSH probing hosts, using TCP Wrapper. This is version two of ssh_block, a total re-write since the first version.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Free CRM Software With Something for Everyone Icon
    Free CRM Software With Something for Everyone

    216,000+ customers in over 135 countries grow their businesses with HubSpot

    Think CRM software is just about contact management? Think again. HubSpot CRM has free tools for everyone on your team, and it’s 100% free. Here’s how our free CRM solution makes your job easier.
  • 5
    AutoBahn is a reactive unix log monitor, capable of analyzing logs for suspicious activity and implementing firewall rules to block offenders, all in real-time.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Panoptis plans to create a network security tool (N-IDS) to detect and block DoS and DDoS attacks. The programming language is C++, and the input is being provided by routers.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    Bruteblock allows system administrators to block various bruteforce attacks on UNIX services. The program analyzes system logs and adds attacker's IP into IPFW table effectively blocking them. Addresses are removed from the table after expiration period
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    IPHits is a security tool that will scan various log files of blocked IPs and report any matches found from a list of Anti-P2P companies.Designed to simplify the reporting process of blocked IP ranges to keep future block lists current.Email your results
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    A HTTP-Proxy (TCP-Forwarder) which allows to measure and block (filter) Internet Access for Stations or Rooms online on a PHP-Page. Designed, recommended and used for classrooms with public internet access. It is neccesary to have a Privacy-Agreement
    Downloads: 0 This Week
    Last Update:
    See Project
  • Component Content Management System for Software Documentation Icon
    Component Content Management System for Software Documentation

    Great tool for serious technical writers

    Paligo is an end-to-end Component Content Management System (CCMS) solution for technical documentation, policies and procedures, knowledge management, and more.
  • 10
    A Small Perl script that monitors possibly hostile sshd login attempts at log level. Every suspicious host will be added to the blacklist and if those attempts exceed a given interval, actions to block that particular IP-address can be taken.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next