With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
All Things Performance and Partner Marketing, All in One Place
Track calls, leads, and clicks without the manual work
Automatically tie revenue back to campaigns, channels, publishers, and networks through marketing attribution. Spend less time juggling reports, and more time optimizing for growth by using a single operating solution for partner and performance marketing.
Logscan summarizes you logfiles in a quick, effective, flexible and standardised way. It runs your logs through awk, which uses an AWK-script per service. It is architecture independent, designed for use in crontab. You can even create custom scripts.
The project supplies a template or skeleton for mainly batch processsing applications which make use of the korn Shell (ksh / pdksh), Perl and other executables (see docs). Functionality @ shell/Perl level: logging, sending email to the support, ...
Rootsh is a wrapper for shells which logs all echoed keystrokes and terminal output to a file and/or to syslog. It's main purpose is the auditing of users who need a shell with root privileges. They start rootsh through the sudo mechanism.
A POSIX GUI file viewer capable of displaying manual pages and maintaining document meta-data (highlighting and bookmarks) per user per file; a local socket server for easy integration with other software, text can be processed with shell commands.
sudosh is a sudo shell, filter and can be used as a login shell. Sudosh records all keystrokes and output and can play back the session as just like a VCR.
Logcheck is software package that is designed to automatically run and check
system log files for security violations and unusual activity. Logcheck
utilizes a program called logtail that remembers the last position it read
from in a log file.
Automated Computer Auditing Daemon - Keep a track of what's going on with your systems: suid, sgid, world writable, hidden and unowned files monitoring as well as important file's md5sums management audits sent to your mailbox on a regular basis.
Pace-IDS is an Intrusion Detection system designed to replace Tripwire, in that it is faster, and more effective of detecting trojan activity, and is easier to configure. All you have to do usually is simply change one variable to your email address.
We help different businesses become digital, manage projects, teams, communicate effectively and control tasks online.
Plan more projects with Worksection. Use Gantt chart and Kanban boards to organize your projects, get your team onboard and assign tasks and due dates.
Pace Check is a utility that searches through system logs and finds cases where someone has tried to gain access to your server (non-legit), then it saves them to a log, mails them to you, or sends them to stdout. It supports http, ftp, and others.