Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.
Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
Try Retool free
Find Hidden Risks in Windows Task Scheduler
Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.
Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
The Meta Policy Information Base is a project that implements the ideas of adding meta-policies to a policy-based network environment. Added functionality to the traditional approach is modeled with new classes that improve the performance of the former
xjnm is a java daemon that gathers numbers from arbitrary sources (e.g. cpu usage) and can store it on arbitrary storages (e.g. a jdbc database) for later analysis or react in arbitrary way to the data collected (e.g. inform an administrator by e-mail).
AirTraf is a 100% passive network sniffer/analyzer that auto-detects wireless access points, determines wireless nodes associated with the given access points operating at its channels, tracks packet count/byte information of different types of 802.11b as
This is the home base for all open-source development of thirdHalf.com. Right now there are two projects: jNetTool - Since 2001, a network utility program encompassing ftp-like mirror of files, proxy, and misc web-related needs, now at 99% completion; OSDRAW - drawing applet for jdk1.1
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
A framework that takes most of the pain out of writing non-blocking network servers in Java 1.4. It'll shield you from low-level details of output buffering, selector management etc. leaving you to concentrate solely on writing the network protocol.
EasySnuffle is a measurement tool for capturing the protocol messages, internal protocol states and to measure implementation performance on networking nodes. Measuring probes for UDP, IP and IEEE 802.11b MAC are implemented.
SnortKonsole is a Java-Frontend for the Open Source Network Intrusion Detection System Snort. It supports all configuration-aspects of Snort. The configuration distribution and activating of sensors is done via scp/ssh.
It's a modern take on desktop management that can be scaled as per organizational needs.
Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
Adaptations From the Avalon/JXTA World<br>
a) James-JXTA (p2p email system) <br>
b) IM on JXTA (Jabber)<br>
c) JXTA Implementation on Avalon Framework <br>
- development stopped! - GATMAN - The first known combination of a network/user administration and a groupware solution - Latest technologies such as JAVA,XML,JSP and strong encryption are used - Modular design, high scalability - Accessible by client an
JWatchDog is a simple, yet powerful Java based, generic framework for a watchdog for services and processes. The use of the framework is flexible, however, it's mainly used to immediately notify admins when services fail
Surfboard is a filtering HTTP 1.1 proxy. It features dynamic filter management through an interactive HTML console, IP tunneling, WindowMaker applets, and a suite of filters.
Spumoni provides SNMP monitoring capability to any application which can be queried via local commands. This enables applications which were previously invisible to remote monitoring systems to now be health-checked by OpenNMS, Tivoli, MRTG and others.
The tool is designed to complement the mail administration tool called oMail-Admin in order to create a new
email domain. One particular advantage of the tool is that it should lead to significant savings on time spent
debugging problems with a
Simple LAN Monitor aims to develop software for providing the network traffic load trough sniffing. It's based in a server/client arquitecture. It also provides a MRTG plugin.
Update: The code from this project has been contributed to the GNU Crypto project.
The Cryptix SASL Library is an implementation of the Java SASL bindings and a number of SASL mechanisms.
eManTools is a set of tools, which includes such things as a rule-based log file processor, a NT EventLog to BSD Syslog forwarder, monitoring scripts, a web based console, and integration and customizations for commercial products like Tivoli.
Phosphor is a peer-to-peer file sharing program. XML network protocol, with source in Java and Swing. Uses thread pools extensively and is designed to scale very well. Chat capabilities. This is Napster done right!
This interface will allow you to write code to retrieve and send promiscuous network packets from your Java program. It could provide a starting point for a java nmap or such...
Linuxlord is a client/server architecture to enable web based thin client computing using Linux. After installing Linuxlord you are able to login your linux desktop from everywhere via an java applet running in your web browser.
El simulador de MPLS son un conjunto de clases que permiten ver el funcionamiento interno de una red que usa este protocolo. La fortaleza del proyecto está en la búsqueda dinámica de rutas por medio de una emulación de LDP para el paso de etiquetas.
A desktop application for monitoring 'top' output from multiple UNIX servers. J/Top has an easy-to-use GUI as well as sentries for monitoring top output for threshold breaches.