Firewalls Software

OS OS

  • More...

Category Category

License License

Translations Translations

Programming Language Programming Language

  • More...

Status Status

Audience Audience

User Interface User Interface

Firewalls Software

  • The Sight of Sound The Sight of Sound Icon
    The Sight of Sound Icon

    ­ Improve VoIP Visibility from SIP to RTP

    Cloudbased voice solutions are common in enterprise networks and frustrating for operations teams to manage. Simplify VoIP monitoring by having a proactive analysis of on-prem, hybrid and UCaaS voice services. Try the ThousandEyes VoIP monitoring solution today, free.
  • Master DevOps using online learning resources from ACM! Master DevOps using online learning resources from ACM! Icon
    Master DevOps using online learning resources from ACM! Icon

    Stay current with the DevOps tools that are redefining how software and IT teams collaborate, and learn how to transform your organization today.

    Master emerging DevOps technologies and frameworks. Learn the foundations of DevOps, or take a deep dive into cutting-edge technologies and frameworks like Docker, Amazon Web Services, Kubernetes, Ansible, Ubuntu, Agile, SDN and more with ACM’s collection of more than 50,000 online books, courses and videos from O’Reilly, Packt, John Wiley, IT Revolution, Skillsoft and other leading publishers.
  • Security Depot

    Security Depot is a central place for computer security tools and documentation for every OS and platform. Defense, attack, and auditing tools for and against all OSes have been collected into one repository.

    Downloads: 0 This Week Last Update: See Project
  • USE secure operating system Icon

    USE secure operating system

    a secure, open source OS for use inside USEagency facilities

    A secure and open source operating system. All communications that reasonably can be will be encrypted. It will also have fined-tuned firewall capabilities, with a default policy of deny all inbound except HTTP HTTPS and SSH. Web browser will be sand boxed from other parts of the OS. In order to access saved passwords, cache, cookies, ect in web browser, username/password are required. Downloaded files (and any other files entering the system) will be subjected to both an exception-based and signature-based virus scan. After that, they will be placed in a leveled security storage space, each more secure--with the most secure being 50. Under 50 will be 46-49; under that is 36-45; under that is 27-25; under that is 26; under that is 14-25; under that is 6-13; under that is 5-3; lastly there is level 2 the most insecure. The operating system itself will require many passwords: boot up, access logon screen, login, admin, and more/ Mainly, it will be built with strong security as its base

    Downloads: 0 This Week Last Update: See Project
  • Previous
  • You're on page 1
  • Next

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you