Showing 2 open source projects for "hosting"

View related business solutions
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • Total Network Visibility for Network Engineers and IT Managers Icon
    Total Network Visibility for Network Engineers and IT Managers

    Network monitoring and troubleshooting is hard. TotalView makes it easy.

    This means every device on your network, and every interface on every device is automatically analyzed for performance, errors, QoS, and configuration.
    Learn More
  • 1
    NSmartProxy

    NSmartProxy

    NSmartProxy is an open source reverse proxy tool

    NSmartProxy is a reverse proxy system that enables external access to devices or applications behind NAT/firewalls without requiring public IPs or router configuration. It’s designed to work with desktop and server apps, and includes a centralized SmartNode server that helps initiate and maintain tunnel connections. This makes it ideal for remote access to local services or self-hosted applications. NSmartProxy supports both TCP and UDP protocols, making it versatile for a wide range of...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 2
    sWAF

    sWAF

    A simple Web Application Firewall docker image

    ...It runs NGINX as a dedicated reverse proxy embedding powerful WAF engines: ModSecurity 3, using OWASP® ModSecurity Core Rule Set (CRS) rules, and NAXSI. It uses acme.sh for Let's Encrypt and other free CA support. A lot of people are self-hosting their own cloud infrastructure (using Nextcloud, Synology, QNAP, a cloud lease server or home-made solutions...), but we can never be too much paranoid about web security for a lot of good reasons. Too much time security is left on the background, or only by using some basic - but not sufficient - options and applications are front-faced to the big bad Internet.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next