Application Monitoring That Won't Slow Your App Down
AppSignal's Rust-based agent is lightweight and stable. Already running in thousands of production apps.
Full APM with errors, performance, logs, and uptime monitoring. 99.999% uptime SLA on the platform itself.
Start Free
Secure File Transfer for Windows with Cerberus by Redwood
Protect and share files over FTP/S, SFTP, HTTPS and SCP with the #1 rated Windows file transfer server.
Cerberus supports unlimited users and connections on a single IP, with built-in encryption, 2FA, and a browser-based web client — all deployable in under 15 minutes with a 25-day free trial.
httest is a script based tool for testing and benchmarking web applications, web servers, proxy servers and web browsers. httest can emulate clients and servers in the same test script, very useful for testing proxys.
360-FAAR Analyze FW1 Cisco Netscreen Policy Offline Using Config/Logs
360-FAAR (Firewall Analysis Audit and Repair) is an offline, command line, firewall policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in Checkpoint dbedit, Cisco ASA or ScreenOS commands, and its one file!
Read Policy and Logs for:
Checkpoint FW1 (in odumper.csv / logexport format),
Netscreen ScreenOS (in get config / syslog format),
Cisco ASA (show run / syslog format),
360-FAAR compares firewall policies and uses...
Extract and Convert Juniper Firewall Policies to CSV
Perl script that connect via SSH to your Juniper SRX firewall and extract the firewall rules,
Parses them and produces a local csv file for import into excel.
Written to fill a requirement, If you fix it or make it better please let me know?
chainssh is a shell script to smplify the ssh login via multiple sshgateways/firewallgateaways. e.g. connect from homehost via sshgateway to a clusternode with one command.
dhcp-gen is a perl script that was written by me and Trond Erik Dalho to simplify editing dhcpd.conf for adding static ip to computers and equipment on our school. It also made it easier to do manage the network by limiting some computers access to the local network only. Creating closed networks. And it also worked as a database over all our computers and equipment, making it easier to keep track of everything.
All information about equipment is stored inside csv files which are comma separated.
Perl script which monitors configured urls. If specified response of a url fails the configured server will be restarted or whatever is configured.
A dedicated recovery script for each url can be defined.