AlienVault® Unified Security Management™ (USM™) is an innovative approach to security monitoring, delivered in a unified platform. The USM platform includes five essential security capabilities that provide resource-constrained organizations with everything they need for effective threat detection, incident response, and compliance management, in a single pane of glass.Advertisement
OSI-Approved Open Source (229)
- Academic Free License (2)
- Apache License V2.0 (3)
- Apache Software License (2)
- Apple Public Source License (1)
- BSD License (20)
- Common Development and Distribution License (3)
- Common Public License 1.0 (1)
- Eclipse Public License (1)
- GNU General Public License version 2.0 (169)
- GNU General Public License version 3.0 (27)
- GNU Library or Lesser General Public License version 2.0 (31)
- GNU Library or Lesser General Public License version 3.0 (1)
- IBM Public License (1)
- MIT License (7)
- MITRE Collaborative Virtual Workspace License (1)
- Other License (8)
- Public Domain (7)
- Creative Commons Attribution License (2)
Grouping and Descriptive Categories (179)
- 32-bit MS Windows (95/98) (6)
- 32-bit MS Windows (NT/2000/XP) (12)
- 64-bit MS Windows (12)
- All 32-bit MS Windows (48)
- All BSD Platforms (25)
- All POSIX (130)
- OS Independent (29)
- OS Portable (16)
- Project is OS Distribution-Specific (5)
- Project is an Operating System Distribution (19)
- Project is an Operating System Kernel (10)
- Modern (155)
- BSD (124)
- Windows (121)
- Mac (110)
- Other Operating Systems (53)
- Android (48)
- Operating System Kernels
- Systems Administration
- Software Distribution
- System Shells
- Distributed Computing
- Embedded systems
- Home Automation
- OS distribution
KoinKoin is an operating system, based on a second generation microkernel, k2 (strongly inspired by the L4 API). KoinKoin offers a modular design allowing to build specific-purpose and minimalist operating systems.
InsaMonitor is a monitor program that consists of multiple deamons and graphical clients showing real-time information of the monitoring deamons (CPU, memory, processes, optional : users, disk, alarms) over the network. Developpers : insa toulouse dgei 4
LibG100 is a common library to use all capacity of the Casio Afx2/Graph100 Calculator
The Netwrix Auditor Effective Permissions Reporting Tool enables you to quickly track down who has access to what across both AD and file servers, see how that access was gained, and get ready-to-use reports in a few clicks. It is free of charge and will never expire, so you can be sure it’ll be there for you when you need it most.Are you an IT pro at a company with 250+ employees?Advertisement
This is for development of the ide-floppy driver for the Linux Kernel. I am monitoring the linux-kernel mailing list and the alt.os.linux.hardware newsgroup. This driver supports at least ATAPI ZIP 100/250, LS-120 Superdisk and Iomega Clik!/PocketZip.
Linux XP is a new distribution destinate with new come in the world linux déstiné with people coming from Windows. This distribution is very simple A installs, has to configure, is very intuitive, by defect all the software necessary has a use usual
LiteOS is our attempt to write a free OS for calculators known as "TI-68k". TI naturally stands for Texas Instuments while 68k designs the Motorola 68000, in other words the processor running such calculators.
MEDDAC is the seeding point for designing a new approach to Operating System design itself. It is an Open Source project with roots in mainframe design and development the author began in 1979. Monitor Editor Disassembler Decompiler Assembler Compiler
META is a decision making software which aims are to track computer attackers, computer attacks and to help investigators finding useful elements.
Object storage is clearly the simplest, most flexible, and most scalable way to store tons of unstructured content. Scality’s Zenko.io enables developers and businesses to take advantage of this simplicity, for free. Whether you're programming in Go or Java, or whether you're using existing applications for personal or shared data management, Scality’s Zenko.io is a great starting point.Advertisement
The aim of this project is to develop a standalone mobility plateforme, that supply security aspect, network aspect (dialing, QoS, P2P ...), fleet management and which is embedded mobile service such as push (mail, application ...) with an open API.
a small os
New Generation Smart GRID-Decentralized Operating System
Meta pkg is a cross packager, which is able to generate differente binary packages from one description file, typically deb, rpm, etc.
a miniature early Macintosh emulator
Cloudbased voice solutions are common in enterprise networks and frustrating for operations teams to manage. Simplify VoIP monitoring by having a proactive analysis of on-prem, hybrid and UCaaS voice services. Try the ThousandEyes VoIP monitoring solution today, free.Advertisement
Lem is a object-oriented extension language with a C-like syntax. A Lem "source" program is compiled interactively and then executed. This project aims also to develop a shell (lemsh) based on the Lem programming language.
Mutualized distant storage space management tool (using a distributed system).
A Free and Open Source Operating System by SamyPesse Version Actuelle: 10.04 Web-Site: http://myos-os.org [French Only]
The goal of this project is to provide a plasticity SDK, i.e. to allow developpers to create UIs that can be displayed on the fly on various devices (other PCs, PDAs, cell phones...).
A number of tools to enhance management/coding of NFR (http://www.nfr.net) IDA, and various other admin tools that can be used for both NFR and hand coding other appliance scripts.
NFSProxy is a proxy for the NFS protocol. Its purpose is to cache the data which go through it, so files can be delivered far more quickly on a second read.
NOCAssist manages a web hosting company from colo to virtual-dedicated servers. Will alsos install/config (remote) up to 5 *NIX OSes. This program includes a CMS, Ticket system and a whole lot more.
NPK MUD-like environment: a shell environment that aims to transform a computer shell in a MUD-like text-based virtual reality.
Internet Control Firewall Intrusion Detection and Logger for Inbound and Outbound Traffic. Watches Files and Directories, Drive and Memory Protection.
The NotNet (Notebook Network) Profiler lets you specify a linux kernel boot parameter and loads the chosen network scheme (+ related services). When logging in, it changes the browser's proxy configuration according to the current network scheme.
Do you know all devices connected to your IT network ? Do you know which software or hardware component is installed on a computer ? Are you able to deploy softwares or configuration scripts on your computers ? No, then Try OCS Inventory NG at http://www.ocsinventory-ng.org...
This project is an interface between asterisk, the user and a database. All configuration of asterisk is into the database without using realtime. At the present time everythings is writed in php.