Showing 7 open source projects for "system protections"

View related business solutions
  • Our Free Plans just got better! | Auth0 by Okta Icon
    Our Free Plans just got better! | Auth0 by Okta

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
    Try free now
  • Bright Data - All in One Platform for Proxies and Web Scraping Icon
    Bright Data - All in One Platform for Proxies and Web Scraping

    Say goodbye to blocks, restrictions, and CAPTCHAs

    Bright Data offers the highest quality proxies with automated session management, IP rotation, and advanced web unlocking technology. Enjoy reliable, fast performance with easy integration, a user-friendly dashboard, and enterprise-grade scaling. Powered by ethically-sourced residential IPs for seamless web scraping.
    Get Started
  • 1
    teo-emulator

    teo-emulator

    Teo is an emulator of the Thomson TO8 microcomputer

    Teo is an emulator of the Thomson TO8 microcomputer for PC, running on MSDOS, Windows and Linux. The compatibility is close to 100% for softwares which don't use non emulated peripherals and don't hold physical protections. In other words, if a software doesn't work on Teo, so probably : 1. it needs the presence of another peripheral than mouse, light-pen, joystick, tape recorder and disks (so it won't run as long as this peripheral is not emulated), 2. its physical protection...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 2
    Advanced Persistent Security

    Advanced Persistent Security

    Advanced Persistent Threat Security

    The architecture of the system is integrated by different Fingerprinting mechanisms. The system is designed from a core that avoids the detection of sdhash and Memory analysis Built-in security, allows anonymous browsing by filtering requests external identification, Exit Tor Nodes and using the TOR Fingerprinting structure The system is designed to navigate without being detected or registered by any search engine or online platform denying all types of response to servers...
    Leader badge
    Downloads: 12 This Week
    Last Update:
    See Project
  • 3
    husk
    An iptables front-end to allow rules to be expressed in a more flexible, free-form style using language closer to plain-English than iptables commands. Rules are then compiled to normal iptables commands.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    An advanced qmail distribution based on qmail-sql which has SMTP, SMTPS, POP3, POP3S, IMAP, IMAPS services, a content scanner, spoofing protections, SMTP AUTH support, SMTP-after-POP/IMAP, PHP5 API, SPF support and much more...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Red Hat Ansible Automation Platform on Microsoft Azure Icon
    Red Hat Ansible Automation Platform on Microsoft Azure

    Red Hat Ansible Automation Platform on Azure allows you to quickly deploy, automate, and manage resources securely and at scale.

    Deploy Red Hat Ansible Automation Platform on Microsoft Azure for a strategic automation solution that allows you to orchestrate, govern and operationalize your Azure environment.
    Learn More
  • 5
    rcf is an ipchains-based firewall with support for over 50 protocols, masquerading, portforwarding, IP accounting and various protections. Unlimited public, private, DMZ and MZ interfaces are supported. Rules are defined per interface and DMZ/MZ clusters.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    This is an add on for the Linux Kernel Patch named Medusa DS9 developed by Marek Zelem, Milan Pikula, and Martin Ockajak. This program will activate and deactivate medusa protections securely. Medusa is at http://medusa.fornax.sk/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    A driver for NT-compatibles (later other OSes) that implements processor protection abstractions (like memory and instruction protections) for user-mode applications, enabling the creation of cooperative OSes, accelerated emulators and runtimes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next