Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.
Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
Start Free
Our Free Plans just got better! | Auth0
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Screen squid is web-based interface for viewing reports based on Squid proxyserver log files. It can be accessed from web-browser through more than 50 reports. No extra files, only DB. All reports generated "on-the-fly". And we got personal cabinet for each user/group.
For owntracks, see https://owntracks.org/
mqottrace collects location data from the mqtt server and writes it into
an sqlite3 database. You can convert the data into gpx tracks with
mqott2gpx.
...Use the Dallas 1-Wire and iButton chips with standard filesystem commands. Create temperature loggers. Monitor everything. OWHTTPD -- same system, only used as a light weight web server. OWFS is also ported to embedded routers, Mac OSX and Windows.
Basically you can use these inexpensive little sensors and other chips with very simple wiring to sense and control the physical environment. The interface is very flexible -- everything from a web browser, to read and writing directly to the chip's "file" to integrating with your programs -- even over the internet.
...
FWNUA (Free Windows Network User Accounting) runs silently in a Windows login script or GPO and collects data about user logins. FWNUA keeps track of the workstations logins so you don't have to!
FWNUA now supports syslog and Splunk! Look for the fwnua - syslog version in the files list. Use Splunk or your own syslog server with data mining tools to create a robust user tracking system.
PurePostPro is a utility that is run via the PureFTPd uploadscript facility. It's one solution to centrally handling uploads from a number of users, and extensive logging is provided by a Perl+MySQL combination. The key feature of the software is that duplicate files should be detected, and incoming files have an MD5 checksum automatically generated. All upload details, including timestamp, uploaded-by, checksum, filename and location are all stored in a 2-table database. The software...
sarPplot simple application which takes output of atsar application and put it into Gnuplot config files , kind of useful on server boxes for performance analyze . cpu,process load,disk,disk-partition,memory & swap,paging & swapping, and many others...
DAD is a Windows event log and syslog management tool that allows you to aggregate logs from hundreds to thousands of systems in real time. DAD requires no agents on the servers or workstations. Correlation and analysis is driven through a web front end.
hMailLive gives you statistics about your mail from the popular hMailServer mail server.
Written in perl for compatibility with most web servers and the like. Requires an installation of hMailServer to work (obviously)!
The logjana program is a log program for the jana proxyserver V2. It splits the main logfile "proxy.log" in timed files. The main logfile "proxy.log" will not be change. For questions send a mail at michael.wiechert(at)goo
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
BASE is the Basic Analysis and Security Engine. It is based on the code from the Analysis Console for Intrusion Databases (ACID) project. This application provides a web front-end to query and analyze the alerts coming from a SNORT IDS system.
A framework for information security management. It has the centralized server for managing the IDS sensors, log consolidation and correlation, report generation etc. Also it has customized IDS sensor based on snort.
A mail server (postfix, sendmail) log analyzer. Feed it with your log files and you値l get information on each transaction (sender, receiver, ip_client, date, etc.). Various query allowed, it works with mysql or without any db. Written in perl.
Remote analyse of servers.
OS for Servers: 1st Step: UX (primary linux)
Analysing Logfiles (syslog, every other logfile, free customize)
Analysing Quotas, Free Space, Processes, Connected Users
Central Server for collecting this Information and Displ
Alist is a program that collects hardware and software information about systems and stores it in a database for users to browse and search via a Web interface. The program consists of three parts: a client portion that collects the information, a daemon
Whale is a project that does pre-filtering for logfiles created by the squid proxyserver. The accesslog creates by squid will be put in a SQL databases (currfently PostgreSQL). After that a usercan filter out data you don\'t need and call other progra
Pace-IDS is an Intrusion Detection system designed to replace Tripwire, in that it is faster, and more effective of detecting trojan activity, and is easier to configure. All you have to do usually is simply change one variable to your email address.