Streamline Azure Security with Palo Alto Networks VM-Series
Centrally manage physical and virtualized firewalls with Panorama
Improve your security posture and reduce incident response time. Use the VM-Series to natively analyze Azure traffic and dynamically drive policy updates based on workload changes.
Learn more
Build Securely on AWS with Proven Frameworks
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
A command line utility written in Visual Basic to assist system administrators at institutions such as schools to minimise the use and storage of inappropriate material in Server shares. User-definable rules for file deletion can be created.
The goal of the Symbiosis project is to develop software which allows people to communicate, share knowledge, and learn. The primary subject of learning will be the Buddha Dharma, but it will be possible to use it for other subjects also.
Full-stack observability with actually useful AI | Grafana Cloud
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
Clouseau for SQL Server is designed to aid system administrators (SAs) and Microsoft SQL Server database administrators (DBAs) in the identification and resolution of various vunerabilities found within Microsoft's enterprise database server:
a linux netfilter/iptables firewall log summarizer with graphical and command line interface that helps the sysadmin in his daily routine. points of interest can be examined closer to gain further information. you can also run it in command line mode and
A utility that lists all URLs in a user's Internet Explorer cache. The list can be exported to a text file or copied to the clipboard. Written in Visual Basic for most Windows versions.
The Castellan Sentry detects login attempts, and gives the user the ability to block, allow or research the person attempting to connect. It utilizes a GUI front end to allow the user to make their decision quickly and easily.
OpenSSL Digest frontend for Windows. This program can be used to create/verify MD2/MD4/MD5/SHA/SHA1/MDC2/RIPEMD160 checksums of your files. OpenSSL32 now supports file encryption/decryption using various encryption Ciphers, such as Blowfish, Idea, DES,
The chgpw utility changes account passwords on machines across a peer-to-peer LAN. Shows how VB.NET can make interop calls to some of the Net API functions.
A secure collaborative framework that is being used by other projects such as CFAgent (online customer service), CFWeb (pure HTTP communication for CFAgent) and much more in addition to serving as a standalone all-in-one collaboration platform by itself.
ThorsenCode is a client-server system, that allows you and your buddies to share files in a safe way. It features encrypted filetransfers and encrypted chatrooms.
Saint Lawless is a pentetration toolkit. It will be part Cheops and part Nessus with an isometric game-like GUI. Saint Lawless will attempt to gain as much information about a network environment with the least amount of probes. Saint Lawless will also
Linuxshield is a java based tool to create and deploy firewall scripts. You will also be able to collect and read security logfiles from within this tool. Linuxshield has built-in a 'pain in the ass' unbreakable firewall configuration.
Direct Connect Hub Script Creator - Designs Custom Scripts For The DC Hub - Chose Options And Then Hit Preview So You Can See Script Before It Is Actually Written - 20 Operator Functions And 4 Levels Of OPs So Each Level Can Be Given Different Powers
Packet Flood Generator as the name stands is a projet to produce a
threaded traffic generator program, it has support for generating IP, TCP , UDP, ICMP and IGMP packets, also has as feature to keep the connection up.
The File Shredder securely shreds files by overwriting them before they are deleted. Every character in the file is overwritten with customised random data, so it is secure, but a little slow. The file is also given a random name.
Ariesbot, is an ircbot, which will be able of doing basic bot functions such as op/deop/kick/ban/moderate. Plus being able to Wu-Ftpd scans, cgi/php scans port scans, subnet scans and scan for vuln version of apache to nosejob.c.
ISO 17799 - Code of practice for information security management. Creation of methodology and documentation for audit adapted to ISO. One is made up of an introduction on general aspects of the security of the information.
Track all IP/TCP, IP/UDP, NetBeui, IPX/SPX connections and ARP/RARP traffic. Optionally save connections in MySQL database. Implement http server so you can view connections with web browser or GTK client. Can send fake ARP reply and kill TCP connection
The secsuite Security Suite is, as it is called, a security suite. At the moment, only a portscanner with a graphical GUI is implemented. Screenshots of it are not yet avaiable.
Freemail enables secure, anonymous, two-party communication over
Freenet. The use of flexible channel initiation protocols and secure message transport allows allows cultivation of anonymous identities with reliable reputations.
Peekabooty is a peer-to-peer application which can route web page requests around firewalls. This is done by asking hosts in the network that are not censored to fetch censored web pages.