Compliant and Reliable File Transfers Backed by Top Security Certifications
Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.
Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
Start Free Trial
Stop Storing Third-Party Tokens in Your Database
Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.
Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
This project is now dead. It has been replaced by a Wiki located here: http://www.linspireguide.com. If you're interested in getting involved please stop by and sign up.
This tool is designed to help Linux beginners to work with Linux Bash easily.
It is written in Python 3.
The default username is "tux"
The default password is "linux"
Compressed caching is a new level in the virtual memory hierarchy, where pages are stored in some compressed format, decreasing the number of page faults that are serviced by slow hard disks. We aim to implement this idea in the Linux Kernel.
A Linux 2.6 kernel module for the Datagram Control and Congestion Protocol (DCCP). DCCP intends to provide a datagram service with TCP-like or TCP-friendly rate control.
DefconfigManager is too to generate consistent Linux Kernel defconfig for different architectures and machines. It is based Kconfiglib, Python library to parse Kconfig's and defconfigs.
Stop Cyber Threats with VM-Series Next-Gen Firewall on Azure
Native application identity and user-based security for your Azure cloud
Gain integrated visibility across all traffic in a single pass. Deploy Palo Alto Networks VM-Series to determine application identity and content while automating security policy updates via rich APIs.
Goal of Linux Doors (ldoor) project is to implement Solaris doors API under Linux.
Doors are fast intra-machine RPC interface. Implementation consists of kernel part
(written as device driver) and user-level library emulating Solaris calls.
One importa
Linux Dynamic Switch (IP/MAC Killer) is designed to switch datagram based on the incoming network interface. The switch will not check the IP (or MAC) address of those datagram. It will forward the packages to the proper outgoing network interface(s). Thi
Enhanced version of the standard Linux loopback device that makes the loopback device act more like a hard drive and allows for mounting partitions within a drive image via new loopback device names (/dev/loopa, /dev/loopa1, /dev/loopa2, etc.).
The Entitlement Based Scheduler (EBS) is a modification of the Linux O(1) CPU scheduler that introduces entitlement based scheduling for SCHED_NORMAL tasks.
Linux From Source Code. It's used truly "cross-compiling" (without chroot) then "native-compiling" methods for making Beigesoft™ Linux From Source Code multi-arch (64/32bit) since version 1.5.
The Linux Intrusion Detection System is a patch which enhances the kernel's security. When it's in effect, many system administration operations can be made impossible even for root. You can turn the security protection on or off online and you can hide
A patch and kernel module for Linux 2.6 kernels to allow you to replace the circa-1970s PC speaker console beep with a userspace action of your choice.
Functional and design specifications documents for Linux 2.4 kernel subsystems, services and the modules. This is a collaborative work by engineers in industry and in the open source community,
with open peer review.