Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Download Now
Try Google Cloud Risk-Free With $300 in Credit
No hidden charges. No surprise bills. Cancel anytime.
Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
Utility to move honeyd.log entries to a MySQL database.
...Then you can run some queries and of course visualize the data if you want to.
Many things are hardcoded or dead simple, but it does the job. The file is a modified version of “honeyd_importer” perlscript originally writen by Joshua Gimer and shared through “honeypots” mailing list.
PERLscript and required environment to easily use the Afterglow software (http://afterglow.sourceforge.net/ Copyright (c) 2006 Raffael Marty) by listing the packet captures to visualize or by specifying a directory that contains the packet captures.
Webstats Solr is an attempt to make Apache Access log easier to Data Mine. By adding a powerful Search Engine (SOLR) as a Backend and using Java Script and HTML and maybe PHP I hope to out date AWStats.
Aw2sql is a Perl CLI script which analyze the results of the Awstats and store them into a MySQL database. After this you can query this results from your own site and create a personalized design to the statistics.
Unlimited organizations, 3 enterprise SSO connections, role-based access control, and pro MFA included. Dev and prod tenants out of the box.
Auth0's B2B Essentials plan gives you everything you need to ship secure multi-tenant apps. Unlimited orgs, enterprise SSO, RBAC, audit log streaming, and higher auth and API limits included. Add on M2M tokens, enterprise MFA, or additional SSO connections as you scale.
A Perlscript to parse SWG game chat log files to break out chat tabs separately. Use this for catching guild meetings, hotchats, post-combat analysis, and RP adventures!
PACIE (Perl Analysis Console for Intrusion Events) Attempts to be a complete replacement for ACID. Place this cgi script on your internal webserver and receive powerfull reporting on your current snort database.
This very simple perlscript parses you iptables log files and produces a report in text format with a summary based on the prefix of the log ( --log-prefix option of iptables ).
Prefix description is allowed.
The CounterStrike Log Gazer, or short csloggazer, is a highly customizable perlscript to search through the load of CounterStrike log files. The user hat the opportunity to filter the files in a bunch of different ways.
Compliant and Reliable File Transfers Backed by Top Security Certifications
Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.
Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
mrtg-eth is a perlscript which provides a probe for the Multi Router Traffic Grapher to print statistics for network devices which do not support the SNMP protocol. It reads if-stats from /proc/net/dev and generates an output suitable for MRTG.
A Small Perlscript that monitors possibly hostile sshd login attempts at log level. Every suspicious host will be added to the blacklist and if those attempts exceed a given interval, actions to block that particular IP-address can be taken.