With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
Try free now
The #1 Embedded Analytics Solution for SaaS Teams.
Qrvey saves engineering teams time and money with a turnkey multi-tenant solution connecting your data warehouse to your SaaS application.
Qrvey’s comprehensive embedded analytics software enables you to design more customizable analytics experiences for your end users.
Intelligently block brute-force attacks by aggregating system logs
SSHGuard protects hosts from brute-force attacks against SSH and other services. It aggregates system logs and blocks repeat offenders using several firewall backends, including iptables, ipfw, and pf.
cravlAndBlock is simple java application that cravl error log file of Your web server and add all attacker IPs.
I.E. All Modsecure entries, scans and so on.
Every bad IP will be added to hosts.deny file with ALL prefix.
For sure it will not block all atacks but it will help.
How it works: use cron to start java cravlAndBlock.jar in the same folder add properties.xml (I addes sample properties.xml file).
And thats all.
Program will start from cron, read properties file and
make...
AutoBahn is a reactive unix log monitor, capable of analyzing logs for suspicious activity and implementing firewall rules to block offenders, all in real-time.
Panoptis plans to create a network security tool (N-IDS) to detect and block DoS and DDoS attacks. The programming language is C++, and the input is being provided by routers.
Deploy Red Hat Enterprise Linux on Microsoft Azure for a secure, reliable, and scalable cloud environment, fully integrated with Microsoft services.
Red Hat Enterprise Linux (RHEL) on Microsoft Azure provides a secure, reliable, and flexible foundation for your cloud infrastructure. Red Hat Enterprise Linux on Microsoft Azure is ideal for enterprises seeking to enhance their cloud environment with seamless integration, consistent performance, and comprehensive support.
A HTTP-Proxy (TCP-Forwarder) which allows to
measure and block (filter) Internet Access for Stations or Rooms
online on a PHP-Page.
Designed, recommended and used for classrooms with public internet access.
It is neccesary to have a Privacy-Agreement
A Small Perl script that monitors possibly hostile sshd login attempts at log level. Every suspicious host will be added to the blacklist and if those attempts exceed a given interval, actions to block that particular IP-address can be taken.