The book shows you how architecting a modern security visibility infrastructure can help your business adapt to new threats, lengthen the usefulness of your current security investments, and optimize uptime and availability. See the entire threat landscape, understand security visibility basics, support both inline and out-of-band security systems, explore security visibility use cases and ask the right questions about visibility.Sponsored Listing
OSI-Approved Open Source (107)
- GNU General Public License version 2.0 (60)
- BSD License (25)
- GNU General Public License version 3.0 (12)
- GNU Library or Lesser General Public License version 2.0 (10)
- MIT License (4)
- Affero GNU Public License (3)
- Academic Free License (2)
- Apache License V2.0 (2)
- Common Development and Distribution License (2)
- GNU Library or Lesser General Public License version 3.0 (2)
- Adaptive Public License (1)
- Artistic License (1)
- Common Public License 1.0 (1)
- PHP License (1)
- Qt Public License (1)
- Other License (4)
- Creative Commons Attribution License (3)
- Public Domain (3)
- BSD (119)
- Modern (119)
- Linux (111)
- Mac (72)
- Solaris (70)
- Windows (54)
Grouping and Descriptive Categories (53)
- All POSIX (41)
- All BSD Platforms (28)
- OS Portable (20)
- 64-bit MS Windows (14)
- All 32-bit MS Windows (14)
- 32-bit MS Windows (9)
- OS Independent (5)
- 32-bit MS Windows (4)
- Project is an Operating System Distribution (2)
- Classic 8-bit Operating Systems (1)
- Project is OS Distribution-Specific (1)
- Project is an Operating System Kernel (1)
- Audio & Video
- Business & Enterprise
- Home & Education
- Science & Engineering
- Security & Utilities
- System Administration
Powerful webdav client tools.
Manage existing clusters of machines efficiently via SSH.
A BASH script that will burn DVD movies from different sources like .iso/img/nrg or VIDEO_TS by utilizing FOSS tools like growisofs, nrg2iso and mkisofs.
Discover Nintex Workflow Cloud - the fastest, easiest way to improve the way you do business. This state-of-the-art technology - built in the cloud, for the cloud - gives you the ability to create powerful, integrated workflows independent of any single platform. With our intuitive, drag-and-drop workflow design canvas, you can configure and deploy automated business processes with speed and simplicity. Try it today!Sponsored Listing
ECCE is a text editor designed by Hamish Dewar at Edinburgh University in the 1960's, which is still in daily use. Several historical implementations of ECCE exist in various languages. This implementation in portable C is for modern computers.
Extended C Library
Java tool which allows to easily back-up and synchronize folders content while resolving conflicts automatically. It can synchronize folders and files structures with a destination files repository
New World an Auto Bot
Use your Gmail account for file storage. No file size limits. Doesn't have to be installed.
ThousandEyes extends visibility across corporate networks as well as the public Internet, helping to solve issues from the branch through MPLS links and SIP trunks to service provider networks. Simulate pre-deployment capacity, monitor detailed performance metrics and see how QoS settings impact call quality.Sponsored Listing
GmshMorph is a tool to be used with GMSH, the meshing program by Christophe Geuzaine and Jean-François Remacle, for oceanographic and land-based fluid dynamics modelling. The program shapes meshes produced by GMSH to fit specified contour data.
A set of python scripts to provide command-line access to GroundWork Open Source. gwcmd allows to perform operations from commandline, and from remote servers.
A awesome lightweight http server in java
HICA (Hidden Confidential Archives) is a program that allow to the linux user, hide his configuration, cache, cookies, etc. of his Firefox browser to the eyes of users that use your system or account, for then restore it fastly and with little command.
An effort to develop an E-mail verification system that would make it impossible for people to get away spoofing other people's E-mail identities without permission to do so.
With Infoblox DDI, your IT teams can consolidate DNS, DHCP, IP address management, & other core network services into a single platform. Orchestrate DDI functions for hybrid & public cloud & virtual & private cloud environments and access rich reporting & analytics capabilities for capacity planning, asset management, compliance control, & auditing. Boost IT efficiency & automation with seamless RESTful API integration.Sponsored Listing
InspIRCd is no longer managed though SourceForge. For information and the latest version, please check out: http://www.inspircd.org
Ipv6PacketGen is a tool which can generate, in an easy manner, any ipv6 packet to test purposes. In fact, it's a library for an easy ipv6 manipulation.
Junk, how do you delete this?
Plugins, tools and utilities for Merb projects. Merb is a Ruby MVC framework that is lighter, faster and more flexible than Ruby on Rails.
MesoRD is a stochastic and deterministic simulator of coupled chemical reactions and diffusions in space.
Easily access more than 100,000 products and tools with our robust search engine. Manage your entire IT lifecycle from purchase to renewal all in one place — so you can get more done faster.Sponsored Listing
Music::Tag provides a framework to correct music metadata using MusicBrainz and Amazon.
check_csl is Nagios plug-in, which calculates service availability level (SLA) depending on multiple various category checks' states. According to defined conditions, the check interprets results and returns service level - "OK", "Warning" or "Critical"
The open sourced NetRexx reference implementation
Observium is an autodiscovering PHP/MySQL based network monitoring system focused primarily on Cisco and Linux networks but includes support for a wide range of network hardware and operating systems.
Open Source SIP Back to Back User Agent) and Billing system. Has an Embeded TCL interpreter making session control and session mediation limitless in flexibility. Useful for: Routing Engine, Calling Cards, SBC, Peering, Wholesale and more!
An application for scheduling vocabulary using the Pimsleur approach