Search Results for "intrusion and detection and system"

19 programs for "intrusion and detection and system" with 1 filter applied:

  • Run applications fast and securely in a fully managed environment Icon
    Run applications fast and securely in a fully managed environment

    Cloud Run is a fully-managed compute platform that lets you run your code in a container directly on top of Google's scalable infrastructure.

    Run frontend and backend services, batch jobs, deploy websites and applications, and queue processing workloads without the need to manage infrastructure.
  • Claims Processing solution for healthcare practitioners. Icon
    Claims Processing solution for healthcare practitioners.

    Very easy to use for medical, dental and therapy offices.

    Speedy Claims became the top CMS-1500 Software by providing the best customer service imaginable to our thousands of clients all over America. Medical billing isn't the kind of thing most people get excited about - it is just a tedious task you have to do. But while it will never be a fun task, it doesn't have to be as difficult or time consumimg as it is now. With Speedy Claims CMS-1500 software you can get the job done quickly and easily, allowing you to focus on the things you love about your job, like helping patients. With a simple interface, powerful features to eliminate repetitive work, and unrivaled customer support, it's simply the best HCFA 1500 software available on the market. A powerful built-in error checking helps ensure your HCFA 1500 form is complete and correctly filled out, preventing CMS-1500 claims from being denied.
  • 1
    DAR - Disk ARchive

    DAR - Disk ARchive

    For full, incremental, compressed and encrypted backups or archives

    DAR is a command-line backup and archiving tool that uses selective compression (not compressing already compressed files), strong encryption, may split an archive in different files of given size and provides on-fly hashing, supports differential backup with or without binary delta, ftp and sftp protocols to remote cloud storage Archive internal's catalog, allows very quick restoration even a single file from a huge, eventually sliced, compressed, encrypted archive eventually located on a...
    Leader badge
    Downloads: 152 This Week
    Last Update:
    See Project
  • 2
    Java Service Wrapper
    Configurable tool which allows Java applications to be installed and controlled like native NT or Unix services. Includes fault correction software to automatically restart crashed or frozen JVMs. Critical when app is needed 24x7. Built for flexibility.
    Downloads: 26 This Week
    Last Update:
    See Project
  • 3
    Stuntman - STUN server and client

    Stuntman - STUN server and client

    High performance, production quality STUN server and client library

    New version 1.2. This is the code to STUNTMAN - an open source STUN server and client code by john selbie. Compliant with the latest RFCs including 5389, 5769, and 5780. Also includes backwards compatibility for RFC 3489. ICE and WebRTC ready. Version 1.2 compiles on Linux, MacOS, BSD, and Solaris. Supports the STUN protocol on both UDP and TCP for both IPv4 and IPv6. Windows binaries are also provided. Additional features are in development. This is a mirror of the code on...
    Downloads: 18 This Week
    Last Update:
    See Project
  • 4

    FTimes

    A forensic system baselining, searching, and evidence collection tool

    FTimes is a forensic system baselining, searching, and evidence collection tool. Its primary purpose is to gather and/or develop topographical information and attributes about specified directories and files in a manner conducive to intrusion and forensic analysis.
    Downloads: 7 This Week
    Last Update:
    See Project
  • Small Business HR Management Software Icon
    Small Business HR Management Software

    Get a unified timekeeping, scheduling, payroll, HR and benefits portal with WorkforceHub.

    WorkforceHub is the instantly useful, delightfully simple to use, small business solution for tracking time, scheduling and hiring. It scales as your business grows while delivering the mission-critical features an organization needs. It is tailored to, built for, and priced for small business employers.
  • 5
    AIDE - Advanced Intrusion Detection Environment
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    ( pro ping )pinger network alert monitor

    ( pro ping )pinger network alert monitor

    Pinger alert, STATICTICAL TABLES, send EMAILs or SMS by SMS GATEWAY

    Thank you for your DONATIONS for Pinger alert, STATICTICAL TABLES, send EMAILs or SMS by SMS GATEWAY. Look on the tab files, select and download the version of the operating system that you need of this slight textual code that requires no system update. Network monitoring analyzer, network scanner with ping, traceroute and beeper alert and warning mail sender. Capable of scanning IP INFINIT, automatic detection of the source of network interruptions without GUI interface configurations. More...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Snort
    ** As of Snort 2.9.7.6, we are longer releasing Snort on SourceForge. Please head to http://www.snort.org from now on!** **As of June 2017, the mailing lists are no longer on SourceForge, and have moved to https://lists.snort.org** Snort is a libpcap-based sniffer/logger which can be used as a network intrusion detection and prevention system. It uses a rule-based detection language as well as various other detection mechanisms and is highly extensible.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    mp3splt

    mp3splt

    utility to split mp3, ogg vorbis and FLAC files without decoding

    mp3splt is a free utility to split mp3, ogg vorbis and FLAC files without decoding, selecting begin/end time; if file is an album, you can get splitpoints automatically from internet or a local cue, cddb file. It also splits Mp3Wrap and AlbumWrap archives. Supports splitting and trimming by silence detection. For mp3 files, both ID3v1 and ID3v2 are supported using original tags or user defined tags.
    Leader badge
    Downloads: 1,099 This Week
    Last Update:
    See Project
  • 9
    Libnids - NIDS E-component, based on Linux kernel. This library provides IP defragmentation, TCP reassembly and port scan detection.
    Leader badge
    Downloads: 69 This Week
    Last Update:
    See Project
  • Integrate in minutes with our email API and trust your emails reach the inbox | SendGrid Icon
    Integrate in minutes with our email API and trust your emails reach the inbox | SendGrid

    Leverage the email service that customer-first brands trust for reliable inbox delivery at scale.

    Email is the backbone of your customer engagement. The Twilio SendGrid Email API is the email service trusted by developers and marketers for time-savings, scalability, and delivery expertise. Our flexible Email API and proprietary Mail Transfer Agent (MTA), intuitive console, powerful features, and email experts make it easy to ensure all your email gets delivered in seconds and without interruption.
  • 10
    LibIDMEF is an implementation of the Internet Engineering Task Force (IETF), Intrusion Detection Exchange Format Charter Working Group (IDWG), draft standard Intrusion Detection Message Exchange Format (IDMEF) protocol.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    PSeudo terminal Intrusion Detection System. The kernel part plugs into terminal processing subsystem and logs hashed terminal lines. The user part reads these, consults a list of allowed entries, and takes appropriate action upon unexpected lines.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    MIDAS is a Network Monitoring and intrusion detection server. It uses a distributed client/server model that allows it to scale to very large networks. As well its own client It supports both Netsaint plugins and Big Brother Clients.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    An Host-Based Intrusion detection system (for Unix) with modules in C and perl. It locally checks for signs of trojans, worms, rootkits, miss-configurations and other system problems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Intrusion detection / "sticky" honey pot technology using virtual servers to detect and trap worms, hackers, and other malware. ***Historical use only - Active Development stopped***
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    QuIDScor is a daemon software integrating Intrusion Detection Systems (IDS) and vulnerability assesment and management platforms. Today QuIDScor correlates and verifies Snort alerts against QualysGuard vulnerability assessment data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    STAT is a framework for building modular, stateful signature-based intrusion detection systems. STAT provides a means to develop sensors which operate in different domains and environments.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Manage sources of video (i.e., from a security camera), recording clips where motion has been detected, and allowing those clips to be replayed. Variable lead-in/out time, motion detection, logging.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Pace-IDS is an Intrusion Detection system designed to replace Tripwire, in that it is faster, and more effective of detecting trojan activity, and is easier to configure. All you have to do usually is simply change one variable to your email address.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Internet Control Firewall Intrusion Detection and Logger for Inbound and Outbound Traffic. Watches Files and Directories, Drive and Memory Protection.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next