Network slow but you don't know the cause? Use Bandwidth Analyzer Pack (BAP) to monitor and analyze network bandwidth performance and traffic patterns. With BAP you can identify which users, applications, and protocols are consuming the most bandwidth. You can also monitor Wireless LAN Controller traffic to see what applications and clients are using your wireless network. Try it free for 30 days!Sponsored Listing
OSI-Approved Open Source (446)
- Academic Free License (8)
- Adaptive Public License (2)
- Affero GNU Public License (3)
- Apache License V2.0 (10)
- Apache Software License (3)
- Artistic License (4)
- Artistic License 2.0 (1)
- BSD License (94)
- Boost Software License (1)
- Common Development and Distribution License (2)
- Common Public Attribution License 1.0 (1)
- Common Public License 1.0 (1)
- Eclipse Public License (1)
- GNU General Public License version 2.0 (244)
- GNU General Public License version 3.0 (55)
- Other License (21)
- Public Domain (19)
- Creative Commons Attribution License (11)
- Modern (494)
- BSD (481)
- Linux (466)
- Mac (368)
Grouping and Descriptive Categories (301)
- 32-bit MS Windows (95/98) (25)
- 32-bit MS Windows (NT/2000/XP) (53)
- 64-bit MS Windows (47)
- All 32-bit MS Windows (95)
- All BSD Platforms (224)
- All POSIX (247)
- Classic 8-bit Operating Systems (2)
- OS Independent (35)
- OS Portable (37)
- Project is OS Distribution-Specific (3)
- Project is an Operating System Distribution (3)
- Project is an Operating System Kernel (2)
- Windows (264)
- Solaris (210)
- Audio & Video
- Business & Enterprise
- Home & Education
- Science & Engineering
- Security & Utilities
- System Administration
TV is a tool that helps to automate the testing of reactive, concurrent systems.
A clone of the NVSwap windows Utility for NVIDIA NForce-based onboard cards using ALSA. May also futurely evolve into something like the NForce Control Panel.
ACBIC - Annoying .Cue / .Bin to .Iso Converter - Converts CD Images from .cue / .bin format to standard .iso format.
ThousandEyes extends visibility across corporate networks as well as the public Internet, helping to solve issues from the branch through MPLS links and SIP trunks to service provider networks. Simulate pre-deployment capacity, monitor detailed performance metrics and see how QoS settings impact call quality.Sponsored Listing
Network String Scanner is a network discovery tool written in Perl. It allows you to search for a given string on a given port, supplied with a range of hosts. It will then determine if it has found a match.1 weekly downloads
The Heirloom Project provides standard Unix utilities.87 weekly downloads
The GTK+ Development Environment is an light, efficient tool for developing in any language. It acts as a framework around the user's preferred editor and compiler, providing complete project management.
A tool written in C++ to generate very large Fibonacci numbers using the primary recursive formula: F(n) = F(n-1) + F(n-2) n > 1; F(1) = 1, F(0) = 0.
This is an easy to use and extensible rules engine written in C# for .NET and Mono.
Easily access more than 100,000 products and tools with our robust search engine. Manage your entire IT lifecycle from purchase to renewal all in one place — so you can get more done faster.Sponsored Listing
Displays text or information from a document by rapidly "flashing" short segments on the screen. This has also been called Rapid Serial Visual Presentation (RSVP), and is intended, experimentally, to aid with reading speed and comprehension.
Invasores is a simple Shoot them up game. It's fun and it has been written in Python. You can modify the graphics and the levels to enhance the game and to enjoy. It is being developed with Python and Pygame. Newer versions are now at GitHub. https://github.com/lskbr/invasores4 weekly downloads
Experimental lightweight editor
HICA (Hidden Confidential Archives) is a program that allow to the linux user, hide his configuration, cache, cookies, etc. of his Firefox browser to the eyes of users that use your system or account, for then restore it fastly and with little command.
The HyperJournal is a free web application which enables on-line as well as printed publishing in an innovative and significantly cost-cutting way. The HyperJournal can be easily installed and managed without any out-of-the-ordinary IT-competence.2 weekly downloads
You’ve likely added a tool to fix one problem and then a different tool to fix another problem. Pretty soon you have multiple instances of the same tool, different tools with overlapping functionality, no ability to collaborate across teams—all resulting in unknown bottlenecks and complicated or no reporting. As a DevOps leader, it’s up to you to balance the autonomy and flexibility of a DevOps approach. But how?Sponsored Listing
The Sundowner .NET Tools Collection provide some platform-independent libraries for common-tasks like logging, localization or also encryption. All these libraries are also compatible with the Mono-Project Framework.
Oreon will be renamed in Centreon in july 2007. Centreon is a network, system, applicative supervision and monitoring tool, it is based upon the most effective Open Source monitoring engine : Nagios. Centreon provides a new frontend and new functionnalit
Alpaga - a library of fast and accurate mathematical functions, written in PowerPC assembly.
PhpDaBomb is a content management system for the linux/apache enviroment to allow quick and easy editing and posting of content in various forms. The goal of phpDaBomb is to be able to drive almost any small website.
proctools provides the pgrep and pkill commands, which, respectively, scan for and send signals to processes that are matched by command line options. This is vaguely similar to the killall command from Linux's psmisc package, but has many more features1 weekly downloads
A UPS monitor daemon for the CyberPower 320 SL UPS which allows you to specify any serial port to watch or any shutdown script you would like to occur. It is very compact and easily used.
Shoki is a free, open source network intrusion detection system. The fundamental design goals are simplicity and modularity, and the focus is on traffic analysis rather than content inspection.
Securing the Secure OS.
The Asian game of Go takes place two-dimensional board. Its idea readily extends to three dimensions - placing stones on a cubic grid. This is a program for playing on such a three-dimensional grid. It runs under Java and needs the Java3D extension.
A meta-configuration engine to aid in system administration, installs, upgrades, and replication. Works with RPM, automatically resolves dependencies like apt-get, and can build from source tarballs.
Small scripts, config files & how-to to provides simple interface statistics for MRTG without usiong SNMP daemons on routers which wave to be monitored. WHAT YOU NEED TO USE THIS TOOL: MRTG on a server, BASH...that's all!
pam_mount is a Pluggable Authentication Module that can mount volumes for a user session (login). Supports mounting local filesystems of any kind the normal mount utility supports, with extra code to better support CIFS, FUSE, various crypto, and more.7 weekly downloads