Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.
Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
Start Free
Secure File Transfer for Windows with Cerberus by Redwood
Protect and share files over FTP/S, SFTP, HTTPS and SCP with the #1 rated Windows file transfer server.
Cerberus supports unlimited users and connections on a single IP, with built-in encryption, 2FA, and a browser-based web client — all deployable in under 15 minutes with a 25-day free trial.
Strong Email & Apache Log Analysis with Active Security Features
X-Itools: eXtended Internet Tools. Suite of tools composed of several collaboration modules. Old and initial project born in 1999, 1st published in 2001 on Sourceforge.
X-Itools E-mail management module (log analysis) initiated in 2004 with Web 1.0 technologies (private SVN server).
X-Itools development restarted since 2011, on the basis of a unique module: E-mail management module (log analysis). Now based on web 2.0 technologies (ExtJS 4.1) and devel restarted because of a particular...
This is the effort to make a simple small business server that provides basic infrastructure with spam and virus protection, service usage accounting and reporting, easy provisioning and password management, message board, addressbook and other.
Gathers data from vpopmail domain and user usage, stores in mysql, and displays a list by user and domain, current quota, quota usage, last time/date of auth, last auth ip, aliases pointing at the address, and aliases pointing to external domains.
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
A PHP application to search for matching strings in log files. It was mainly designed for usage in a syslog server environment with big log files, where you cannot log to databases due to the size, but to plain text files which will be searched.
This counter is powered by PHP and Sqlite. It lets your track hits to your websites or a specific page. Use it for Craigslist, Email (if somebody reads your email), or simply for your own website.
exim2awstats is a PHP script that can translate the log files from the Exim MTA (http://exim.org) into a format that can be used by the log analyzer AWStats (http://awstats.sourceforge.net).
using PHP (and some ShellScript) to protect your linux server against bruke force attacks(http://en.wikipedia.org/wiki/Brute_force_attack).
also keep a log in MySQL and have email reporting
This project was originally created to allow Technical Support personnel to troubleshoot problems with customers logging into their e-mail.
It was written to work with VPOPMail when the VLOG, database logging feature, is turned ON.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Qmail-Scanner Statistics (QSS) uses the Qmail-Scanner Logfile to generate daily, monthly, and yearly statistics. It also shows a complete list of viruses stopped by Qmail-Scanner, the top five domains from which the viruses came, as well as the countries
Rav Antivirus Log Analysis Kit is a collection of scripts that parse the RAV logs and insert the data into a database. Also included is a php front-end that will allow the display of this information.
chill is a heavy-module-based web-application with a core supporting many features. writing own modules for... everything. modules for webmail, firewall/router-administration, server-administration are planned natively.