Showing 8 open source projects for "one-wire"

View related business solutions
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
  • iDeals Virtual Data Room | Efficient, Secure Data Sharing Icon
    iDeals Virtual Data Room | Efficient, Secure Data Sharing

    Over 1,000,000 professionals from 175,000 companies have shared documents securely with iDeals

    Share and collaborate on business-critical documents in a secure way.
  • 1
    Unified Sessions Manager

    Unified Sessions Manager

    Pioneering Private and Public Cloud Management since 2008

    The UnifiedSessionsManager supports the integrated management of user sessions within Private-Clouds, comprising heterogeneous IT landscapes of various physical and virtual machines, hypervisor management, and virtual user sessions with remote desktops. Extracted documents see https://sourceforge.net/projects/ctys-doc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    icones-magicos

    icones-magicos

    scripts de configuração do velho kurumin

    Conjunto de scripts de configuração que existiam no antigo sistema derivado do Knoppix e do Debian chamado Kurumin. No conjunto encontram-se scripts para BASH, algo em Perl e Python, também algo para SED e possivelmente AWK pode ser usado internamente. Também há as interfaces de controle projetadas para funcionar em KDE.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    Log Monitoring - Monitor/Check Log Files

    Log File Monitoring - Check Log Files, Analyze, Alert on any UNIX Log

    Monitoring log files is mandatory in all UNIX environments. LoGrobot does this for you efficiently. It analyzes, graphs and alerts on system log files, application log files, database log files, custom log files...basically any log file. Benefits: Automatically scans log files for errors or user specified patterns Shows the offending log entries in the alerts generated on a monitored log file Shows latest size of a log file at the time of the most recent log check Shows total...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 4
    ELF statifier

    ELF statifier

    Tool for creating portable self-containing Linux executable

    Statifier is a tool for creating portable self-containing Linux executable. Statifier create from dynamically linked executable and all it's libraries (and all LD_PRELOAD libraries, if any) one file. This file can be copied and run on another machine without need to drag all libraries
    Leader badge
    Downloads: 31 This Week
    Last Update:
    See Project
  • Cyber Risk Assessment and Management Platform Icon
    Cyber Risk Assessment and Management Platform

    ConnectWise Identify is a powerful cybersecurity risk assessment platform offering strategic cybersecurity assessments and recommendations.

    When it comes to cybersecurity, what your clients don’t know can really hurt them. And believe it or not, keep them safe starts with asking questions. With ConnectWise Identify Assessment, get access to risk assessment backed by the NIST Cybersecurity Framework to uncover risks across your client’s entire business, not just their networks. With a clearly defined, easy-to-read risk report in hand, you can start having meaningful security conversations that can get you on the path of keeping your clients protected from every angle. Choose from two assessment levels to cover every client’s need, from the Essentials to cover the basics to our Comprehensive Assessment to dive deeper to uncover additional risks. Our intuitive heat map shows you your client’s overall risk level and priority to address risks based on probability and financial impact. Each report includes remediation recommendations to help you create a revenue-generating action plan.
  • 5

    dep-trace

    gdeptrace dependancy solver correct for pkg or make deps

    gdeptrace sorts an input dependancy list or table and prints it, and can do other actions. It's default operation is to act like tsort (1) except that it sorts by pure pkg / make dependancy (tsort sorts by grapical topology: see notes about differences). EXAMPLE: $ echo -e "b e\ne\nc b" | sort -k1,1 | gdeptrace [opts] e b c (b depends on e, c depends on b, e has no depends) (also: e has more items depending on it and is below anything it depends on; in this case...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 6
    dpkglist.awk is a command-line tool for querying available packages on ubuntu and debian systems. It overlaps with the standard apt-cache utility, but, written in simple awk, it is easily extensible, and makes it easy to write one-line scripts.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Always more than one-way script based nms plugins. Nagios add-on project with plugins and tools.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    chainssh is a shell script to smplify the ssh login via multiple sshgateways/firewallgateaways. e.g. connect from homehost via sshgateway to a clusternode with one command.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next