Access competitive interest rates on your digital assets.
Generate interest, borrow against your crypto, and trade a range of cryptocurrencies — all in one platform.
Geographic restrictions, eligibility, and terms apply.
Get started with Nexo.
Gemini 3 and 200+ AI Models on One Platform
Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.
Build generative AI apps with Vertex AI. Switch between models without switching platforms.
STAT is a framework for building modular, stateful signature-based intrusion detection systems. STAT provides a means to develop sensors which operate in different domains and environments.
Pycap provides the ability to capture packets from, and inject packets onto, network interfaces. It dissects commonly found structures in network packets such as Ethernet, IP, ARP, TCP, UDP, and ICMP headers.
An alternative Identification system that is a replacement for Microsoft's Passport and the Liberty Alliance. Its a simple architecture that is setup so anyone can run a server and thereby have control over their online identification.
AI-powered service management for IT and enterprise teams
Enterprise-grade ITSM, for every business
Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
Linux Mobile System is a full Linux system within a USB Flash Memory Drive. This system will be able to boot from any i386 based PC, so we can to run a lot of utilities: network diagnostic, disk diagnostic, administration terminal, etcetera.
This library makes SRV records in DNS simple to use; actually, due to the fallback for classical connection mechanisms, it makes building a network connection in general extremely simple.
isectd is a middleware daemon that provides many-to-many client-to-server connectivity. Supports multiplexing requests to multiple server processes over IP networks.
Scalable Cluster Environment (SCE) is a set of interoperable opensource tools that enable users to build and use Beowulf cluster effectively to solve their problems.
Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.
Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
Originally written by Paul Vixie in 1986 and distributed through mod.sources, "display" is a program which will repeatedly execute a command and display the output through curses. The purpose of this project is to maintain and extend display.
Shadow Watcher is a Peer to Peer log sharing tool for the security analyst. Consider it a "community watch" program which allows you to keep your system secure from the threats on the internet and help others do the same.
PyWIRLD started as a remote ppp dialer. It will be able to manage several machines from a single client, monitor and control network interfaces, and have all features availible via dynamically loadable plugins.
A peer-to-peer chat program that uses public key encryption (via Gnu Privacy Guard) to keep your conversations from the eyes of packet sniffers (*Cough* Carnivore *Cough*)
Etch is a cross-platform, language- and transport-independent framework for building and consuming network services. With Etch, service development and consumption becomes no more difficult than library development and consumption.
The use of NAT devices all over the Internet has made peer-to-peer exchanges unreliable. The rise of IPv6 should repair this, but it will still not be reliable until all peers have implemented IPv6. Such IPv6 implementation could be arranged on the fly with a tunnel mechanism that does not rely on router co-operation or manual configuration.
This specification details such a method of embedding IPv6 into UDP and IPv4. It employs embedded Router Solicitation to configure the tunnel's...