• Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • 1

    Recursive LDD

    Recursive implementation of List Dynamic Dependencies (LDD)

    ...It can also print unique values only as well as environment variables that affect the loading of libraries: LD_LIBRARY_PATH and LD_PRELOAD. Same limitations to standard ldd apply. Recursive-ldd cannot check libraries without read permissions.
    Leader badge
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    A daemon to detect spammers trying to harvest email addresses by username guessing and temporarily DROP them with iptables firewall rules. The program also looks for and kills sendmail processes that have been stuck in "cmd read" mode for a long time.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB