Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Download Now
Go from Code to Production URL in Seconds
Cloud Run deploys apps in any language instantly. Scales to zero. Pay only when code runs.
Skip the Kubernetes configs. Cloud Run handles HTTPS, scaling, and infrastructure automatically. Two million requests free per month.
A simple command-line Java application which searches a webpage for a search term (intended for torrents, can be used for anything) every few minutes. Use it to be alerted when new releases arrive!
Remotely-controlled(XML) bandwidth measurement and bottleneck detection daemon, based on tmetric and gnu traceroute (see pchar/patchar). Goal is to help admins monitor and compare performance of Internet connections.
Wireless.D is a Linux Daemon process which on boot will automatically handle the configuration of the system's wireless card to the pre-defined access points if detected.
Subether is a p2p network system that allows applications to find each other to make use of peering resources. Included is a distcc application. I'm trying to make the worlds largest compiler.
The Datagrapher is a webfrontend for the RRDTool of Tobias Oetiker. Main task is the simple creation of combined graphics which can be dynamically generated and manipulated.
Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.
Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
Just a simple telnet server for those who have none. Written in Java this telnet server relys on telnetd2 from Dieter Wimberger as basic framework and adds a shell that runs on Windows and Unix.
YASeMI (Yet Another Security Monitoring Interface) consists of a Web interface that can be of aid to SysAdmins and Security Admins, in detecting possible anomaly or intrusion behaviour in their network, based on Netflow data their routers emit.
deface-no-tnx is an anti-defacement system that monitors your Web files and notifies you about unallowed changes. It also replaces the defaced page with a standard "error" page,so that no offensive/joking content can be frauodolently added to your site
RevolvingProxy is a cross platform HTTP Proxy application that is designed to be installed on a server that has been assigned multiple IP addresses. Each connecting client is assigned a different IP address for security testing or other purposes.
Jnettop allows administrators of routers to watch online traffic coming across the network in a fashion similar to the way top displays statistics about processes. It is useful for quickly evaluating the state of the network.
NINO is a network and system management solution to monitor your network, systems and applications: integrated, one tool for all. Features: SNMP, WMI, Service Response performance monitoring, graphs with zoom, topology view, events, reporting
LTSP-ThinAdmin is a front-end for LTSP. It allows to manage thin clients configuration in a LTSP server, using a graphical interface. LTSP-ThinAdmin was designed for EduLinux (www.edulinux.cl) but it would have to work in any LTSP server.
Server/client chat environment that allows a client to send a message or file to another client on the server. If the other client is not currently on the server, the server will save the file or message for that client to retrieve later on.
Open uGateway is intended to be an OSGi service framework written in C++ for devices with limited resources, that do not allow the usage of a Java Virtual Machine.
SIGOF (Security Information Graphics Oriented Forensic) aims at synthetizing security log, stored in a acid/base database schema, in order to provide a graphical / visual oriented security forensic and statistical analysis.
Web interface written in php for ISC bind and ISC dhcp configuration and administration. It keeps it's own database containing general dns and dhcp information and information about subnets, hosts etc.
Configures DNS, DHCP, firewalls, RADIUS servers..
Smtp Relay Checker is a network open mail relay checker. It is muti-threaded so it can be used to scan vast networks quickly, it is fully configurable so it can be adjusted to suit any need, and the scan results can be displayed in HTML. It is intended f