Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
OpenSST (Open Simple Secure Transaction) is a project to create a simple security protocol for making transaction between (un)trusted parties. The project includes a protocol design specification and a cross-platform software implementation of the speci
JVerify is a Java app that enables you to monitor for changes in any file on your Unix system, most notably executable binaries, thus alerting you to a possibly backdoored binary. It runs on any platform that supports JSDK 1.4.x and has a MySQL database
The Secure Remote Log Monitor (SRLM) project provides client and server
utilities that collect application or system log files from multiple systems over an untrusted network onto a central server for analysis and action.
startx is the project name for an interface build in php which takes the output of some products like MRTG or awstats or ACID... and put them together in the same Web interface.
Project aims to develop an Apache HTTP Server module that implements the WS-Security specification. It will enable the Apache HTTP Server to identify SOAP messages that include WS-Security information and thereby check security credentials.
The goal of the Symbiosis project is to develop software which allows people to communicate, share knowledge, and learn. The primary subject of learning will be the Buddha Dharma, but it will be possible to use it for other subjects also.
The NEO Project uses the NEO-c (Network Exchange Operation for Charity) platform to participate in various computing challenges and projects, and donates any winnings to the charities specified by its users.
Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Manage sources of video (i.e., from a security camera), recording clips where motion has been detected, and allowing those clips to be replayed.
Variable lead-in/out time, motion detection, logging.
JECC is an open source implementation of public key Elliptic Curve Cryptography written in Java. As of now it provides en-/decrypted out- and input streams.
The JPass.org project relates to the development of a system for authenticating user's identity, more specifically, for providing identity authentication methods using non-reusable and non-reversible one-time IDs.
A secure collaborative framework that is being used by other projects such as CFAgent (online customer service), CFWeb (pure HTTP communication for CFAgent) and much more in addition to serving as a standalone all-in-one collaboration platform by itself.
A similar to Tripwire, file system integrity checking tool but develop in java and cross platform.
This tools checking and source control using check sum algorithm like MD5, SHA and CRC.
Linuxshield is a java based tool to create and deploy firewall scripts. You will also be able to collect and read security logfiles from within this tool. Linuxshield has built-in a 'pain in the ass' unbreakable firewall configuration.
SyncShare Server is a secure messaging and real-time collaboration
platform. Build solutions to connect people, data, and applications through
firewalls and mobile devices. It handles all networking, security issues and lets
one focus on the business
LDAP Enabled Application Framework(LEAFs), is a J2EE based application framework that couples a strong security model with MVC. The security of LEAFs is modeled after the TCSEC Class 2 (C2) security specification.
A Java library for validation of credit cards. Implements the Luhn Algorithm to ensure the card number is well formed, checks card type prefix's and length. The rules are stored in a text file allowing new cards to be added without changing the source
An Experimental Platform for Secure Peer Services, QARE uses a decentralized trust model, a Public Key Infrastructure and provides single logon for multiple applications running across multiple systems. WAR files are used to add applications.