Gaviti is a cutting-edge Invoice-to-Cash platform designed to transform and simplify the accounts receivable management process for businesses. At its core, Gaviti offers a comprehensive suite of features and tools to optimize financial operations.
OPTOSS Next Gen Network Management System (NG-NetMS)
Why to pay tens of thousands $$$ for your network management software?
Get visibility into your networks and complex processes inside with NG-NetMS now!
NG-NetMS is a new end-to-end network management platform for your Linux servers, Cisco, Juniper, HP and Extreme routers, switches and firewalls.
NG-NetMS is precise, quick and efficient. It collects most complete information about the network inventory, topology, map of IPv4 addresses quickly and with minimum hassle.
Most...
Lightweight Event Management System (for Monitoring-Events and more)
Tarantoga is an open source lightweight event management system for events from monitoring and more, with similar functionality to IBM Tivoli TEC, Master Cell, or BMC BEM. It supports your ITIL/ITSM event management process. It relies on MongoDB to store the events and Perl as rule programming language. GUI and backend are seperate tools that communicate only via the MongoDB. Tarantoga understands EIF, so you can send events with "postemsg", "msend -e", and the tarantoga tool tsend. Via EIF...
Este é um projeto, onde estou criando um interface php para controle do servidor Radius, estou utilizando o freeradius. Ele ira contar com base de dados PostgresSql. Php e muitas funções rodando sobre o linux(Ubuntu server).
Command line LOGalyze client. logalyze-cli is a powerful command line client for managing LOGalyze engine.
With LOGalyze application log analyzer, you can collect your log data from any device, analyze, normalize and parse them.
Check_sys is set of scripts written in Perl which can be used to monitor Linux servers (cpu, memory, swap, load, processes, network, filesystems, uptime, disks' I/O). It collects data and stores it using RRDTOOL library. It can log events through syslog
Automated Incident Reporting (AirCERT) is an Internet-scalable infrastructure to automatically receive, process, and analyze security event information reported from across administrative domains.
IP accounting tools package based on Berkeley Packet Filer mechanism. Continue from BPFT by V.Vorobyev, TRAFD by V.Belekhov & S.Svirid.
Use the PCAP library to implement connection to bpf kernel pseudo-device.
A portal project providing useful information for those who have the hard job administering a school network.
Hints, tips, configurations and special software for servers that can be used in educational environments can be found here.
We keep students cyber-safe at school, at home, and everywhere in between
Linewize combines world leading technology with world leaders in online safety education, IT administration, teaching and student safeguarding. Our aim is to help schools, students and families develop better digital habits and better communities. Utilizing a combination of AI and a team of highly trained human moderators, it’s the most advanced K-12 student threat detection tool available. Providing cyber safety education and tools, including a parent app, to engage your school community. Providing screen and content visibility of all devices in class, including BYOD and personal devices. Linewize Monitor is the most advanced student threat detection tool in K-12, helping Districts spot at-risk students. And it's the only solution to hold all four iKeepSafe student data privacy certifications; COPPA, FERPA, CSPC, and ATLIS.
Whale is a project that does pre-filtering for logfiles created by the squid proxy server. The accesslog creates by squid will be put in a SQL databases (currfently PostgreSQL). After that a usercan filter out data you don\'t need and call other progra
A linux kernel module and supporting user space environment which allow interception and modifying system calls that match user defined criteria. Think of it as strace on steroids.
Active Intrusion Detection (AIP)
Provide a barometer of scanning and hacking activity around the Internet that can be used by administrators to help keep their own network(s) safe. Provides automated ACL creation for a variety of platforms.