Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Download Now
Custom VMs From 1 to 96 vCPUs With 99.95% Uptime
General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.
Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
The Free & Popular opendhcp application for Physical & Virtual Machine
Instructions:
1. Write this .iso file to a Pen Drive, with the Free multibootusb software ( links below )
2. Boot from the Pen Drive, after changing the BIOS Boot Order quickly on system startup
3. First startup will show some info dialogs. These can be cancelled without making any changes
4. Click on the opendhcp folder link on Desktop
5. Right click the set_eth0_static_ipaddress.sh file and choose Open as Text option. Edit the file to meet your network needs. To know about...
Scripts written in php/mysql/bash aimed to provide control over volume of traffic downloaded with users through squid proxy server. Users are identified with ip addresses or computers names. Current version of squid-traffic contains an installer that sim
RJStats assists in network and host monitoring by creating many graphs of your servers using rrdtool. These graphs can be viewed using a web browser in any combination you would like to see them.
Green Screen: A Linux based Advanced Syslog Server for Juniper NetScreen Firewalls - Can be expanded later to support other products. It can capture syslog messages, parse them, store them in a MySQL database. A Web GUI interface is also included.
jECTS is a JAVA project that focuses on some of the aspects of ECTS (= European Credit Transfer System). Mainly the translation of local grades into ECTS grades and the generation of a ToR (Transcript of Records).
Tool to analyse syslog message. It parses log message and alerts the administrator on certain conditions. It can also do some reporting on existing logs.
Track failed login attempts with LogSpy. Perform actions based on a user defined rule set, which can include: blocking an IP address from port 22, sending an email to the admin or just log the failed attempts in a seperate file.
Secure File Transfer for Windows with Cerberus by Redwood
Protect and share files over FTP/S, SFTP, HTTPS and SCP with the #1 rated Windows file transfer server.
Cerberus supports unlimited users and connections on a single IP, with built-in encryption, 2FA, and a browser-based web client — all deployable in under 15 minutes with a 25-day free trial.
IPChains Logger aims at providing an useful utility to track bandwidth usage from workstations behind a firewall.
It works well for masqueraded machines.
ipac is an ip accounting package for linux. It collects,
summarizes and nicly displays ip accounting data. The output of
ipac can be a simple ascii table or graph images.
chill is a heavy-module-based web-application with a core supporting many features. writing own modules for... everything. modules for webmail, firewall/router-administration, server-administration are planned natively.