Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Download Now
Our Free Plans just got better! | Auth0
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
General line based buffer with backlog written in "C". It supports multiple input and a single output. I/O modules: TCP/IP, UDP/IP, Unix sockets, File/Pipe. It supports backlog writing (and resume) so a failsafe transport-buffer can be build.
This is a collection of modules and HOWTOs that allow Active Directory to be extended and provide support for LDAP/SSL authentication of Linux hosts, setup a local homedir footprint for Linux users and mount their smbfs remote homedir on login.
Templario is a security event audit and compliance suite which helps you to monitor enterprise security from one central console. Templario automates and consolidates complicated enterprise network security auditing and requires near-zero administration.
Log common Windows trojan attempts (and optionally emulate the trojan).
*This project is not actively maintained, and the software is of little use today.*
This perl script, Peril, uses the Perl module File::Tail to tail the syslog file (or any other file for that matter) and inserts the lines into a MySQL database using DBI. It includes a quick phpMyEdit generated page to view the logs through a browser an
LogViewer is a logfile monitoring tool for KDE 3.2.x that docks into the panel, supporting docking (new!), multiple colors, up to 10 logfiles, filtering via regular expressions and pop-up events when a specific line is added to a monitored logfile.
Daemon to sit between NAS and RADACCT server and provide an automated spooling service of Accounting information should the server fail to respond. Helps reduce impact of temporary failure of single accounting server
SLOP is a PERL and PHP based engine for the collection of and reporting
on logs from various network based devices such as firewalls, switches,
and web servers. So far, SLOP supports Checkpoint firewalls and
Cisco 2900 and 3500 switches.
The Looper Event / Alert System is an application primarily used for network management to perform alert monitoring and redirection. It is designed with extreme simplicity in mind and is highly modularized. Also used as a Netcool probe or gqateway.
The 'Monitor' application, which consists of 2 parts, a MonitorServer (linux daemon) and a MonitorClient (java gui), will enable the user to monitor and log server process, memory, network and cpu information of multiple servers at a time.
Nasty LKM Defender is a module wich protects Your system against some nasty modules (e.g. rootkits).
Well mainly it protects sys_call_table and some other important functions (get_module_list, sys_query_module)
This is a Shell Script. It transform the logs of the linux in HTML pages, with colored erros.
I dont speak english very well but I think... the name explain everything. the name of the script is LOGhtmlER.
Automated Security Tools (autosec) aims to provide
automatic tools which network administrators may use
to help check and test the security of their network.
Generic log parser written in PHP for *nix systems. Log entries are analysed on the fly and consolidated into events that are similar. Results are then displayed via a webpage.
CTrace is a multi-threaded trace debug library written in C. It provides a simple, fast, well documented trace utility for applications and as such is especially suitable for use in real-time embedded applications.
FWReport is a log parser and reporting tool for IPTables. It generates daily and monthy summaries of the log files, allowing the admin to free up substantial time, maintain better control over security of the network, and reduce unnoticed attacks.
USRBAC is a kernel patch and userspace daemon that allows role based access control to be mitegated in userspace. The goal is to allow a secure way to impliment RBAC compliant security systems using a daemon in userspace
Output spool reader for Snort! This program decouples output overhead from the Snort network intrusion detection system and allows Snort to run at full speed. It takes input and output plugins and can therefore be used to convert almost any spooled fil