Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Download Now
$300 in Free Credit Towards Top Cloud Services
Build VMs, containers, AI, databases, storage—all in one place.
Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
Command line tool that can view multiple log files remotely and blend them into a single output based on the appropriate dates within the log files themselves. Has cat and tail modes available. Support for multiple local/remote protocols
A framework for information security management. It has the centralized server for managing the IDS sensors, log consolidation and correlation, report generation etc. Also it has customized IDS sensor based on snort.
Schedule emailing of your Smoothwall logs. Schedule on a daily/weekly/monthly basis via cron jobs. Formatting options are text and html. csv formatting planned.
Access competitive interest rates on your digital assets.
Generate interest, borrow against your crypto, and trade a range of cryptocurrencies — all in one platform.
Geographic restrictions, eligibility, and terms apply.
SAWS is a Secure Audit Service that cryptographically protects all log messages. It can run as either a standalone web service called SAWS (Secure Audit Web Service) or as a Java Secure Audit Trail Service (JSATS) that is called via a Java API.
Scour: a Perl script able to find lines in log files matching a given Perl regular expression. It counts matches within given time periods, and reports on whether the number of matches exceeds a given count, shows matching lines, or executes a command.
What are the packets rejected by your Netfilter based firewall today ? How often this suspicious host try to connect to your box ? What are the most rejected domains ? Who is this strange host which scan your ports ?
The responses are in the iptables log
Secure File Transfer for Windows with Cerberus by Redwood
Protect and share files over FTP/S, SFTP, HTTPS and SCP with the #1 rated Windows file transfer server.
Cerberus supports unlimited users and connections on a single IP, with built-in encryption, 2FA, and a browser-based web client — all deployable in under 15 minutes with a 25-day free trial.
This is an add-on tool set for the Unattended GUI project (http://unattended-gui.sourceforge.net/). The goal is to simplify getting and setting system enviroment properties of an client pc in an network.
PIX Logging Architecture correlates Cisco PIX system logs into a MySQL database and provides a web-based frontend for displaying, searching, and managing Cisco PIX logged events, traffic, and IDS logs (More info at http://www.logging-architecture.net ).
Netlog is a simple network traffic monitor for Linux, written in Perl. It is very easy to use and suitable for workstations and servers. It can log the traffic on different interfaces and the uptime of the controlled Computer.
Adminlog provides the command line tool "i" which permits administrators to read, write, and share first person notes about their administrative actions on a server.
Main//Lonicera provides a consitent mean of executable log information to the Main//Pyrus DMS. It makes Main//Pyrus auditable and is even designed to write its data on worm media to guarantee an unchangeable protocol.
A easy to use memory debugger lib for C++ projects. Tracks and logs (if desired) memory allocations, deallocations, memory leaks. A support template class is also provided to check for memory invasions in dynamically allocated memory using operator [].
rssyslog is a fast, network-only syslog daemon that sorts the messages
to different files based on source IP, facility and severity.
It is intended to be used as a central syslog-server for a large number of
devices.
PyIDS is an intrusion detection system whose aim is to provide concise information to administrators about some parts of the system i.e filesystem checksums, unknown connections to the machine, access control lists of special files, log revision...
The Plague provides a web UI to a MySQL db of parsed syslog data. The focus has been security reporting. The logs supported (so far) are NetScreen firewalls, Cisco routers and switches and PIXen, Gauntlet firewalls.
NSAT is a fast, highly configurable, bulk network security scanner for over 50 different services and hundreds of vulnerabilities. It's main advantage is its flexibility and configurability.
PlayBilling is a webbased billing system for internet cafe and wireless hotspot provider mostly written in Java featured with: tariff management, prepaid, postpaid and discounts, user management and extensive reporting system
An implementation of the Model-View-Controller (MVC) design pattern based on the Jakarta Struts Framework. Includes a core library (Horizon), a servlet container (Stratus), and a Server Pages Engine (Phase). Resembles the J2EE web container environment.
Flogger - a Free Logger.
An easy to use and easy to customize logging library that works on a wide range of operating systems.
Write your log entries effortlessly and efficiently to the console, to a file, to a data base or to some other source.
BASE+ (Basic Analysis and Security Engine) is based on ACID project. This application provides a web front-end to query and analyze the alerts coming from various IDS systems (e.g. Snort).