You’ve likely added a tool to fix one problem and then a different tool to fix another problem. Pretty soon you have multiple instances of the same tool, different tools with overlapping functionality, no ability to collaborate across teams—all resulting in unknown bottlenecks and complicated or no reporting. As a DevOps leader, it’s up to you to balance the autonomy and flexibility of a DevOps approach. But how?Sponsored Listing
OSI-Approved Open Source (114)
- Affero GNU Public License (1)
- Apache License V2.0 (2)
- Artistic License (1)
- BSD License (9)
- Common Development and Distribution License (1)
- Common Public License 1.0 (1)
- GNU General Public License version 2.0 (89)
- GNU General Public License version 3.0 (5)
- GNU Library or Lesser General Public License version 2.0 (11)
- GNU Library or Lesser General Public License version 3.0 (1)
- MIT License (4)
- Mozilla Public License 1.0 (1)
- Mozilla Public License 1.1 (1)
- NASA Open Source Agreement (2)
- Open Software License 3.0 (1)
- Public Domain (4)
- Creative Commons Attribution License (1)
- Linux (104)
- Modern (82)
Grouping and Descriptive Categories (74)
- 32-bit MS Windows (95/98) (3)
- 32-bit MS Windows (NT/2000/XP) (10)
- 64-bit MS Windows (3)
- All 32-bit MS Windows (18)
- All BSD Platforms (11)
- All POSIX (51)
- OS Independent (4)
- OS Portable (5)
- Project is OS Distribution-Specific (3)
- Project is an Operating System Distribution (2)
- Project is an Operating System Kernel (1)
- BSD (54)
- Windows (49)
- Mac (30)
- Android (12)
- Other Operating Systems (9)
- Programming Language: C++ ×
SynAckFlood protect your linux box from portscan attacks, make a ficticious responce parallel to kernel, and portscanner show you that all ports are openned
This is an NIDS/HIDS, Network plus Host based Intrusion Detection System. Este é um NIDS / HIDS, Sistema de Detecção de Invasões Baseado em Redes e em Máquinas.
Small and efficient traffic montoring and counting daemon with ability of remote administation and logging results into the database
With Qlik Sense Cloud Business, you get all the power of Qlik’s unique associative engine and all the convenience of a cloud-based solution – so your team can share insights with confidence and ease. Curious to see how it works? Watch the webinar now.Are you an IT Pro at a company with between 1-500 employees?Sponsored Listing
Tunnelizer is an application suite that allows you to tunnel TCP and UDP traffic through a firewall or proxy server. Communication between the tunnel ends can be either direct or through a SOCKS or HTTP proxy server, and can be optionally encrypted.
a secure, open source OS for use inside USEagency facilities
VMUBounce Advanced IRC Bouncer
The goal of WallFire is to build a very general and modular firewalling application based on netfilter or any kind of low-level framework. It will provide a multi-language API, command line and interactive tools as well as X11 or HTML front-ends.
Statefull Firwalling on Linux Active-Active Clusters: * loadbalancing * synchronization of conntrack table
Lose the spreadsheets. Get Infoblox DDI: Consolidate DNS, DHCP, IP address management into a single platform. Orchestrate DDI functions for hybrid & public cloud & virtual & private cloud environments. Access rich reporting & analytics capabilities for capacity planning & asset management. Boost IT efficiency & automation with seamless RESTful API integration.Sponsored Listing
Cluster-Manager Daemon that uses Netfilter clusterip to make active-active clusterip. Keep-alive notify messages are sent periodically to every clusternode. clusterip is configured automatically when there are changes in the cluster.
"diptables" is short for "distributed iptables" and as the name implies, it is trying to provide a facility to manage a large "firewall system" in which many number of single firwall machines exist. In this state, it is a very simple C++ program to add
This is an Internet resource management system that can be used to control both internet and network access of a registered or unregistered user on all kinds of network.
Fireflier is a firewall tool, which is built on top of the iptables framework. You can create rules based on single incoming network packets or simply allow/deny single packets to pass. This project is discontinued. (see homepage)
Firewall-Rulegenerator creates automatically iptables-scrips from XML-Files containing Information on your network-topology and your required services.
If you'd like to spend less time on integrating data sources and focus on more fun stuff, give Talend Open Studio a try. It's free and open source.Sponsored Listing
ftpknock is a doorknock daemon, which uses ftp like commands to do a secret knock. When a correct secret knock is received, ftpknock will open a port in the server's firewall.
Loggrep greps kernel logfiles on ipchains and iptables firewall log entries and features the ability to filter against given entries (date, IP, port, ..). It also features quasi-detection of protscanning, line count and html output.
Networkdesigner is a tiny gui to create a visual network-topology, to define services an release them to any networkdevice. After that a firewall script on base of ip-tales base linux kernel can be created.
ppfilter is a personal firewall for Mac OS X.
Ptcap is a Unix daemon that captures traffic packet size, source, destination, and times and saves this data into a postgres (and now ODBC including mysql) database in near real time, from which traffic reports may be made.
ThousandEyes extends visibility across corporate networks as well as the public Internet, helping to solve issues from the branch through MPLS links and SIP trunks to service provider networks. Simulate pre-deployment capacity, monitor detailed performance metrics and see how QoS settings impact call quality.Sponsored Listing
UCAS or Universal Central Admin System.Client to Server API system for administrating Unix/Linux/BSD systems that allows a quick and effective method for keeping control of all your servers in one central system.
GPL implementation of a virus throttling daemon
TEF is a fully-featured, secure and has advanced capabilities including the intuitive Xsentry easy-to-use administration graphical user interface with WYSIWYG (What You See Is What You Get) front end which has drag and drop security policy deployment.1 weekly downloads