Showing 134 open source projects for "mpeg-4"

View related business solutions
  • Red Hat Ansible Automation Platform on Microsoft Azure Icon
    Red Hat Ansible Automation Platform on Microsoft Azure

    Red Hat Ansible Automation Platform on Azure allows you to quickly deploy, automate, and manage resources securely and at scale.

    Deploy Red Hat Ansible Automation Platform on Microsoft Azure for a strategic automation solution that allows you to orchestrate, govern and operationalize your Azure environment.
  • Automated RMM Tools | RMM Software Icon
    Automated RMM Tools | RMM Software

    Proactively monitor, manage, and support client networks with ConnectWise Automate

    Out-of-the-box scripts. Around-the-clock monitoring. Unmatched automation capabilities. Start doing more with less and exceed service delivery expectations.
  • 1
    Ircproxy is transparent IRC content-filtering application. It may be used whenever there is a need of monitoring IRC connections.It may be used to deny specific connections or to behold suspicious IRC traffic.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    This project is a collection of Open Source crypto cores and implementations relating to high speed cryptanalysis/cracking and complex implementations.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Viralator enhances your network's squid proxy server with a virus scanner. Before a user can download a file, the proxy passes the file to the Viralator script which, in turn, uses a virus scanner to scan, disinfect, or delete the download.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    UPDATE: As of Fri. April 10th, 2009, UserTracking 2 will be hosted on sourceforge again. It's previous hosting site, http://uitwisselplatform.nl, an initiative from the Dutch Government, has been terminated due to lack of resources to maintain the site.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Multi-Site Network and Cloud Connectivity for Businesses Icon
    Multi-Site Network and Cloud Connectivity for Businesses

    Internet connectivity without complexity

    As your users rely more and more on Cloud and Internet-based technologies, reliable internet connectivity becomes more and more important to your business. With Bigleaf’s proven SD-WAN architecture, groundbreaking AI, and DDoS attack mitigation, you can finally deliver the reliable internet connectivity your business needs without the limitations of traditional networking platforms. Bigleaf’s Cloud Access Network and plug-and-play router allow for limitless control to and from anywhere your traffic needs to go. Bigleaf’s self-driving AI automatically identifies and adapts to any changing circuit conditions and traffic needs—addressing issues before they impact your users. Bigleaf puts you in the driver’s seat of every complaint and support call with full-path traffic and network performance data, delivered as actionable insights, reports, and alerts.
  • 5
    BoCrypto encrypts/decrypts files using one-time-pad keys. Mersenne Twist PRNG is utilized for the key stream. Features enc/dec benchmarking as well as 'duress' key generation. OTP encryption is the only unbreakable encryption, if implemented correctly.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Ikedectypt is a perl script to decrypt IKEv1 packets in libpcap formatted trace file. You can use Ethereal(http://www.ethereal.com) to analyze decrypted trace. Key information(first initialization vector, skeyid_e) is needed to be supplied by user.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Valid CGI Values is (currently) a XHTML forms based technologie for validating CGI values submitted by these forms. It consists of a form parser that analyzes web forms and a package with validation functions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    The TeleAuth Client Tools are a set of Unix tools for the TeleAuth two-factor / two-channel authentication system (http://www.teleauth.com). This includes a commandline client and a set of PAM modules. Written in Perl and C for Linux, OSX and Solaris.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    PADS is a signature based detection engine used to passively detect network assets. It is designed to complement IDS technology by providing context to IDS alerts.
    Leader badge
    Downloads: 2 This Week
    Last Update:
    See Project
  • ConnectWise Cybersecurity Management for MSPs Icon
    ConnectWise Cybersecurity Management for MSPs

    Software and support solutions to protect your clients’ critical business assets

    ConnectWise SIEM (formerly Perch) offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see beyond your network traffic. Our team of threat analysts does all the tedium for you, eliminating the noise and sending only identified and verified treats to action on. Built with multi-tenancy, ConnectWise SIEM helps you keep clients safe with the best threat intel on the market.
  • 10
    This SF project provides all the necessary source code to create and update a non-representative democracy, i.e. an isocracy. This is the software part of the melting-vote project.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    The Dashboard Linux PC Project. A Linux UI for automobile multimedia. To be used for MP3's, GPS, DVDs, CD, etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    FRISK solves the problem of portable forensically-sound incident response.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Cryptix is an international volunteer effort to produce robust, open-source cryptographic software libraries. Cryptix products are free, both for commercial and non-commercial use and are being used by developers all over the world.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    fccu.evtreader is a computer forensic tool that will help an investigator to analyze MS Windows event log files. It is a perl script made to be run under GNU/Linux but should run on other platforms too.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Cisco Torch mass scanning, application layer fingerprinting, and exploitation tool to discover and attack remote Cisco hosts running Telnet, SSH, Web, TFTP, NTP and SNMP services. Useful in auditing large networks for misconfigured/un-updated Ciscos.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Foresight is a security architecture designed to detect, alert, respond, and report on events happening throughout the enterprise. The interface aggregates and correlates security information (like a SIM or SEM) from multiple devices within the network.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    SMSec is a free , open source, GPLed implementation of two-factor authentication via SMS (Short Message Service). It uses SMSD to "talk" to GSM modems, provides a flexible XMLRPC web-service for web-developers integrate SMSec into their web-apps.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    An anonymous pseudonym email server, such as that which runs nym.alias.net.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    sfick (pronounced as "s-fick") is a two part software system whose function is to assist system administrators with the process of verifying the integrity of critical files. Given a system compromise, system administrators must be able to verify the integ
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Shoki is a free, open source network intrusion detection system. The fundamental design goals are simplicity and modularity, and the focus is on traffic analysis rather than content inspection.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Tool to analyse syslog message. It parses log message and alerts the administrator on certain conditions. It can also do some reporting on existing logs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    AIM Sniff is a network sniffer specifically designed to pick up messages transmitted using the AIM or MSN clients and their derivatives. All information can be sent to STDOUT or a MySQL DB.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    This small simple secure mail interface allows users to create messages, encrypt them with a password using the Enigma cipher and then send them to anyone with an email account.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Postnuke Password Recovery is an administration tool for Postnuke-based site administrator who lost their passwords. In case of there is no other admin who can reset password. Currently this tool is built with PHP and PERL.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Helper web application writen in PhP and Perl to mantain local Certificate Authority based on openssl. Provides ability to view issued certificates, issue new certificates, revoke compromised certificates.
    Downloads: 0 This Week
    Last Update:
    See Project