The book shows you how architecting a modern security visibility infrastructure can help your business adapt to new threats, lengthen the usefulness of your current security investments, and optimize uptime and availability. See the entire threat landscape, understand security visibility basics, support both inline and out-of-band security systems, explore security visibility use cases and ask the right questions about visibility.Sponsored Listing
OSI-Approved Open Source (294)
- GNU General Public License version 2.0 (160)
- BSD License (34)
- GNU General Public License version 3.0 (29)
- GNU Library or Lesser General Public License version 2.0 (27)
- MIT License (18)
- Apache License V2.0 (8)
- Academic Free License (7)
- GNU Library or Lesser General Public License version 3.0 (7)
- Artistic License (5)
- Affero GNU Public License (3)
- Microsoft Public License (3)
- Apache Software License (2)
- Common Public License 1.0 (2)
- Eclipse Public License (2)
- Mozilla Public License 1.0 (2)
- Public Domain (14)
- Creative Commons Attribution License (13)
- Other License (5)
- Modern (328)
- Windows (328)
- Linux (158)
Grouping and Descriptive Categories (137)
- 32-bit MS Windows (86)
- All 32-bit MS Windows (72)
- 64-bit MS Windows (47)
- All POSIX (47)
- 32-bit MS Windows (28)
- OS Portable (25)
- OS Independent (22)
- All BSD Platforms (19)
- Project is an Operating System Distribution (3)
- Classic 8-bit Operating Systems (1)
- Project is OS Distribution-Specific (1)
- Project is an Operating System Kernel (1)
- Other Operating Systems (90)
- Mac (85)
- BSD (61)
- Audio & Video
- Business & Enterprise
- Home & Education
- Science & Engineering
- Security & Utilities
- System Administration
An implementation of the Call Partner variation of the Rook card game2 weekly downloads
Allows a developer to separate files used in a Visual Basic for Applications (VBA) project, into plain text files. Running the compiler compiles all of the source into the desired Microsoft Office application ready to to be run.
A tool that will obfuscate any .NET assembly along with its satellites (EXEs and DLLs) by disassembling it to IL code, performing obfuscation techniques, and assembling it back to an executable. Both a CLI (command-line interface) and GUI are available.
Simplify teamwork and stay in control of your communications with MegaPath One. Unified communications makes staying in touch with associates easy and efficient. See when others are available. Initiate a chat. Host a voice or video conference from any device, and invite guests to join via web browser. Handle matters quickly from your always-on virtual collaboration space with presence, instant messaging, video conferencing and screen sharing.Sponsored Listing
This C# console application zips up a set of log files according to a series of command line parameters.
Low level disk read/write "physicaldiskX" sectors to/from files or other drive sector(s). Extremely basic principals of disk clone. Tested Windows NT/2000/XP. Command line. Works on live windows system volume. Free. Source available. Be careful.5 weekly downloads
MonteCarlo portfolio simulation - it can be used as stand-alone command line application - it takes simple XML file needed data as entry and creates simple XML file with output, also this stuff have JNI and ISAPI interface.
A simple emulator and interpreter application with an Assembly-like integrated language. Written in C#. Works with .NET Framework 2.0/3.0/3.5 and Mono 2.0
The myriad of functionality that comes with Snare, from Verbose Truncation to Output Driven Filtering have been helping companies around the world zero in on threats in record time while spending less on their SIEM. This is made possible by reducing the noise in your log collection while delivering the critical data for both forensics and analytics, dependably. Snare just works. Try our agents free today!Sponsored Listing
This suite of deamons (background programs, services) enables an user to exchange data between a serial line device and each program that excepts input from the keyboard. The programs also works well on remote desktops (terminal services).
Phramer - An Open-Source Statistical Phrase-Based Machine Translation Decoder ||| Project web page: http://www.phramer.org1 weekly downloads
A multiuser Diary Management System that will enable staff in organisations to set/update/view meetings and appointments. The system will operate via a central server, but clients will able to function offline. It will support Mac OSX/Windows/*nix4 weekly downloads
Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material. First and foremost for memory dump analysis and forensics usage. Able to identify AES, Serpent, Twofish and RSA keys as of version 0.0.3.1 weekly downloads
Small Telnet Chat (STC) A Chatserver to which you can connect via a telnet client. Provides logging, automatic kicking and IP blocking.2 weekly downloads
With Infoblox DDI, your IT teams can consolidate DNS, DHCP, IP address management, & other core network services into a single platform. Orchestrate DDI functions for hybrid & public cloud & virtual & private cloud environments and access rich reporting & analytics capabilities for capacity planning, asset management, compliance control, & auditing. Boost IT efficiency & automation with seamless RESTful API integration.Sponsored Listing
GetVersionEx - dump of OS version info for windows
LutefiskXP is ANSI C compliant software used to perform de novo peptide sequencing from tandem mass spectra.1 weekly downloads
Automatic article linker for the MediaWiki platform. Scans the wiki database and automatically links articles based on keyword titles.
Database and csv files comparison tool, with some additional features of nice formatting selects' results.
Digital Signal Processing Block Diagram Compiler - user extendable to all DSP's, but presently supports only the TI C2000 family. Rich support for fixed point arithmetic, both saturated and unsaturated. Block diagram entry is via TinyCAD (included).
Discover Nintex Workflow Cloud - the fastest, easiest way to improve the way you do business. This state-of-the-art technology - built in the cloud, for the cloud - gives you the ability to create powerful, integrated workflows independent of any single platform. With our intuitive, drag-and-drop workflow design canvas, you can configure and deploy automated business processes with speed and simplicity. Try it today!Sponsored Listing
LDIFtoCSV Converts LDIF(LDAP Data Interchange Format) text files to CSV(comma-separated values) text files. The file can then be manipulated in a text editor or spreadsheet program easier.22 weekly downloads
JavaTB is a Java ToolBox that goes beyond what operating systems provide for file management, networking, system monitoring and many more functions.
An application dedicated to the accurate measurement of execution time.
MyHook is a low resource, fast, reliable, key logger, with open source code. After 7 years and 30,000 downloads, we have decided to move this project to GitHub. Please visit us here: https://github.com/danamodio/myhook6 weekly downloads
A command line utility to display statistics about a text file consisting of lines of data. The statistics include counts of line terminator pairs (CR, LF, CR+LF) and line counts. Also shows if there is an unterminated trailing line.
YAJNGI is a program that allows you to keeping tabs a set of newsgroups without having to read constantly, simply you will be alerted only when the configuration will find your match or you can use YAJNGI for download your preferred binary files.
Open MP accelerated implementation of distributed network storage system.