Generate secure, production-grade apps that connect to your business data. Not just prototypes, but tools your team can actually deploy.
Build internal software that meets enterprise security standards without waiting on engineering resources. Retool connects to your databases, APIs, and data sources while maintaining the permissions and controls you need. Create custom dashboards, admin tools, and workflows from natural language prompts—all deployed in your cloud with security baked in. Stop duct-taping operations together, start building in Retool.
Build an app in Retool
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
Please note that OWFS source code, and all Issue/Tickets/merge requests have now been moved to https://github.com/owfs/owfs/.
Developer mailing lists will still be kept at Sourceforge.
----
OWFS -- 1-Wire file system. Use the Dallas 1-Wire and iButton chips with standard filesystem commands. Create temperature loggers. Monitor everything. OWHTTPD -- same system, only used as a light weight web server. OWFS is also ported to embedded routers, Mac OSX and Windows.
Basically you can use...
OPTOSS Next Gen Network Management System (NG-NetMS)
Why to pay tens of thousands $$$ for your network management software?
Get visibility into your networks and complex processes inside with NG-NetMS now!
NG-NetMS is a new end-to-end network management platform for your Linux servers, Cisco, Juniper, HP and Extreme routers, switches and firewalls.
NG-NetMS is precise, quick and efficient. It collects most complete information about the network inventory, topology, map of IPv4 addresses quickly and with minimum hassle.
Most...
360-FAAR Analyze FW1 Cisco Netscreen Policy Offline Using Config/Logs
360-FAAR (Firewall Analysis Audit and Repair) is an offline, command line, firewall policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in Checkpoint dbedit, Cisco ASA or ScreenOS commands, and its one file!
Read Policy and Logs for:
Checkpoint FW1 (in odumper.csv / logexport format),
Netscreen ScreenOS (in get config / syslog format),
Cisco ASA (show run / syslog format),
360-FAAR compares firewall policies and uses...
FWNUA (Free Windows Network User Accounting) runs silently in a Windows login script or GPO and collects data about user logins. FWNUA keeps track of the workstations logins so you don't have to!
FWNUA now supports syslog and Splunk! Look for the fwnua - syslog version in the files list. Use Splunk or your own syslog server with data mining tools to create a robust user tracking system.
Find our Spunk app on Splukbase: https://splunkbase.splunk.com/app/2773/
Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.
Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
...The latest version supports named fields in the STL files for tagging data parsed in the Prefix Tree and anonymous functions for parsing dynamic message payloads. We now output JSON objects and I'm working on HBase integration. By outputting to JSON it also leaves open the possibility for on the fly in memory correlation between events. Read the included README before starting, it has a quick start guide and info on the constructors.
The project supplies a template or skeleton for mainly batch processsing applications which make use of the korn Shell (ksh / pdksh), Perl and other executables (see docs). Functionality @ shell/Perl level: logging, sending email to the support, ...
MSLB is a crossplatform Simple Logbook program / application to write work logs or even a diary. MSLB can also use a bunch of presets that you can add with a simple doubleclick :) Logs get saved in a simple folder system. And its all portable.
The Logging of User Actions in Relational Mode (LUARM) is a logging/audit engine designed to record in detail user actions in a Relational Database Management System (RDBMS). You can then have an organized 'who is doing what' view in your system, being able to easily correlate program execution, file access and network endpoint activity to user entities.
The ATSlog software provides a handy web-oriented interface for collecting, viewing and analysing calls for various types of PBX (Private Branch eXchange) models.
This software is designed to run on all POSIX system to log SMA Sunny Boy Inverter data into an MYSQL database via RS485 *ONLY*. It includes scripts to display the data using Highcharts via a webpage.
If you want to log using bluetooth, i'd recommend you go to code.google.com/p/sma-bluetooth/
Update: July 2011
I haven't worked on this project for a while now and don't intend to do anymore with it. If you wish to take it further, please let me know and you can be the project admin for it :)
G15daemon provides support for the G15 keyboard. Multiple LCD clients are supported with a 'virtual' LCD buffer for applications or libraries, and all keys are usable. Users flip through connected screens with a press of a button.Linux, OS-X & Solaris
NeTAMS - Network Traffic Accounting and Monitoring Software. It is built for UNIX and works for networks with Cisco routers or PC Unix routers (Linux/FreeBSD/Solaris).
A logging shell that can log commands from a shell. Designed to act as an automated lab-book for people that conduct experiments in their standard shell environments. Users can log and re-run experiments with little/no manual effort or interference.
A framework for information security management. It has the centralized server for managing the IDS sensors, log consolidation and correlation, report generation etc. Also it has customized IDS sensor based on snort.
PIX Logging Architecture correlates Cisco PIX system logs into a MySQL database and provides a web-based frontend for displaying, searching, and managing Cisco PIX logged events, traffic, and IDS logs (More info at http://www.logging-architecture.net ).
Moodss is a modular monitoring application, composed of a GUI and a daemon, which supports any device or process for which a module can be developed. Complete dashboards with graphical viewers, thresholds, SQL database archiving, ... can be managed.
This project is dedicated to finding best of breed open source monitoring products, tools, sysadmin tools and overall systems management stuff. We will take all these components and make them work together.
Automated Incident Reporting (AirCERT) is an Internet-scalable infrastructure to automatically receive, process, and analyze security event information reported from across administrative domains.
sudosh is a sudo shell, filter and can be used as a login shell. Sudosh records all keystrokes and output and can play back the session as just like a VCR.
A statistics utility to be used with qmail-scanner. It utilizes log entries generated by a patch to the qmail-scanner distribution to report spam and virus details. Often included in the qmailstats script from QmailRocks.org to send nightly stats emails.
IP accounting tools package based on Berkeley Packet Filer mechanism. Continue from BPFT by V.Vorobyev, TRAFD by V.Belekhov & S.Svirid.
Use the PCAP library to implement connection to bpf kernel pseudo-device.
The Looper Event / Alert System is an application primarily used for network management to perform alert monitoring and redirection. It is designed with extreme simplicity in mind and is highly modularized. Also used as a Netcool probe or gqateway.
YAML (tm) is a straight-forward data serilization language, offering an alternative to XML where markup (named lists and mixed content) are not needed. YAML borrows ideas from rfc822, SAX, C, HTML, Perl, and Python.
sldb is the embedded database for syslog. It captures log messages to a disk-backed database, and sorts them by user-defined subject. Excess messages from each bin are pruned on a first-in, first out basis.