Showing 10 open source projects for "icon of program: command"

View related business solutions
  • Outgrown Windows Task Scheduler? Icon
    Outgrown Windows Task Scheduler?

    Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.

    Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
    Download Free Tool
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1
    SonicLog Cruncher
    Perl logfile analyzer for DELL Sonicwall Firewall logfiles. This Perl program (Windows /Linux / Mac), creates an HTML file containing: hits per protocol, mean, median and variance on hourly and weekday basis, RBL statistics, IPS stats, VPN stats, virus stats, surfing statistics, CFS blocked sites stats.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    LUARM

    LUARM

    A detailed user action logging engine

    The Logging of User Actions in Relational Mode (LUARM) is a logging/audit engine designed to record in detail user actions in a Relational Database Management System (RDBMS). You can then have an organized 'who is doing what' view in your system, being able to easily correlate program execution, file access and network endpoint activity to user entities.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Scavenge is a program to find stale and incorrect DNS records.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Simple and easy to use program that helps configuring the network interfaces, allows to have multiple configurations for the same computer and to easy configure NAT for internet sharing.
    Downloads: 1 This Week
    Last Update:
    See Project
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 5
    The logjana program is a log program for the jana proxy server V2. It splits the main logfile "proxy.log" in timed files. The main logfile "proxy.log" will not be change. For questions send a mail at michael.wiechert(at)goo
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    This project consists of a program written in Perl that can encode and decode messages to and from IPv6 packets' source addresses. The IPv6 source address provides a steganographic covert channel in which secret messages can be passed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    MyToBiz is a pure PERL program that sits between your client and MySQL server(s) as a proxy that can monitor, analyze or transform their communication. MyToBiz is a Toolkit which aims to help the DB admin or developer of MySQL database application.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    A hardware configuration and tweaking program for Dell laptops running Ubuntu Linux. This program was written for anyone who desires to automate the configuration of incorrectly configured or unsupported hardware.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    A daemon to detect spammers trying to harvest email addresses by username guessing and temporarily DROP them with iptables firewall rules. The program also looks for and kills sendmail processes that have been stuck in "cmd read" mode for a long time.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 10
    DHCPStatus is a query tool for browsing information stored in DHCPD's .conf and .leases files. It correlates the subnet details in the .conf file with DHCPD's .lease records. It can be run either as a CGI program, or as a text-based command-line utility.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next