One platform to build, fine-tune, and deploy ML models. No MLOps team required.
Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
Try Free
AI-powered service management for IT and enterprise teams
Enterprise-grade ITSM, for every business
Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
C.O.R.E (Computer Organization Relative to Environment) is a plugin architecture designed to allow one to control multiple system within the home. The main component is a Flex/Flash/Actionscript 3 client for the MAC based Indigo home automation software.
Retrieve files from a remote computer using a PDA/Pocket PC running Windows Mobile.
Can access remote computers regardless the geographical position. Can work under WiFi, GPRS or any other wireless networks.
Connects to Active Directory and retrieves a list of computer objects, queries for FSMO roles, and then connects to computer objects and queries for inventory information, outputting results to .csv file.
Computer Breaker is a network testing tool that allows networking administrators to test if a computer is vulnerable to malicious attacks. Using the Nessus scanner, computer-breaker scans the remote host and automaticaly exploits its vulnerabilities.
Yana - Yet Another Network Analyzer. TCP, UDP, IP, ICMP, ARP, SNMP, EGP; FPT, SNTP, HTTP analysis tool with sourcecode (Delphi in release 0.1.0, Freepascal in releases 0.2.x). Includes RFC1213 units libraries source.
This is an implementation of the DYMO protocol for TinyOS. DYMO is a routing protocol for Mobile Ad-hoc Networks. PLEASE NOTE: the sourcecode has now been included in the TinyOS codebase, so this version is not maintained anymore.
Netlog is a simple network traffic monitor for Linux, written in Perl. It is very easy to use and suitable for workstations and servers. It can log the traffic on different interfaces and the uptime of the controlled Computer.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Computer Lab workstation monitoring and control. Allows a supervisor/teacher to monitor students at workstations. Mute volume, disable internet, lock computer, and run and close applications.
GLan is a toolkit for developing network GUI applications. It allows the developer to just write code using the Qt programming style for the server side and forget about the client side.
Target of this project is to code a network scanner which creates the nagios config automatically. Therefore the administrator starts the scanner with an ip address and the scanner results the open ports. nagioscanner provides a web based gui (cgi based)
Network monitoring system designed for middle size computer networks. Its purpose is to detect system or network fault and to display information about detected problem. Almost all services of the monitored hosts are discovered automatically.
The KOM(S) Streaming System (komssys) implements a streaming system based on the IETF protocols RTSP, SDP, RTP/RTCP with the intention of providing a base for researchers and other developers. Komssys includes code for a server, a client, and a proxy
VNC Session Manager adds the nessary glue code between VNC's two execution modes that enables xdm based login to disconnected sessions. i.e. it provides a 'Terminal Services' like login for *nix based vnc servers.
Java and ColdFusion libraries to lookup country code and language from IP address. It uses a local copy of the WHOIS database to perform fast, accurate lookups of country codes. Useful for log analysis, internationalization, geolocation, etc..
VeNCrypt adds TLS/X509 encryption and authentication to VNC. It is heavily based on the RealVNC Free Edition, thus being a single fork away from the original creators of VNC, and is fully compliant with the RFB protocol.
This client-server application allows a master computer to distribute tasks to other slave computers and later join the results. Goal is for the master computer to handle lost connections and load balancing.
DrKnock is a Dynamic Port Knocking solution based on sig2knock (http://www.security.org.sg/code/portknock1.html). Client and server work on both Unix and Windows.
Hermes is a P2P middleware. It's not a framework, but it's a shell over the existing frameworks. This shell is made in such a fashion that it's possible to the app developer to change the underlying framework without any changes to his app code.
The server will periodically send out UDP packets with the internal/external IP addresses, PhoneHome listening ports, and computer name of the remote listener. Remotely disable XP Firewall, and launch NC listener on port of your choice. Review Readme.
Welcome to the Linux-IrDA project. The overall goal of this project is to make an implementation of the IrDA (tm) standards specifications for the Linux kernel. The code is licensed under the GNU Public licence (GPL) and is now included in Linux-2.2.