Search Results for "intrusion and detection and system"

30 programs for "intrusion and detection and system" with 2 filters applied:

  • Cyber Risk Assessment and Management Platform Icon
    Cyber Risk Assessment and Management Platform

    ConnectWise Identify is a powerful cybersecurity risk assessment platform offering strategic cybersecurity assessments and recommendations.

    When it comes to cybersecurity, what your clients don’t know can really hurt them. And believe it or not, keep them safe starts with asking questions. With ConnectWise Identify Assessment, get access to risk assessment backed by the NIST Cybersecurity Framework to uncover risks across your client’s entire business, not just their networks. With a clearly defined, easy-to-read risk report in hand, you can start having meaningful security conversations that can get you on the path of keeping your clients protected from every angle. Choose from two assessment levels to cover every client’s need, from the Essentials to cover the basics to our Comprehensive Assessment to dive deeper to uncover additional risks. Our intuitive heat map shows you your client’s overall risk level and priority to address risks based on probability and financial impact. Each report includes remediation recommendations to help you create a revenue-generating action plan.
  • AI-powered conversation intelligence software Icon
    AI-powered conversation intelligence software

    Unlock call analytics that provide actionable insights with our call tracking software, empowering you to identify what's working and what's not.

    Every customer interaction is vital to your business success and revenue growth. With Jiminny’s AI-powered conversation intelligence software, we take recording, capturing, and meticulous analysis of call recordings to the next level. Unlock call analytics that provide actionable insights with our call tracking software, empowering you to identify what's working and what's not. Seamlessly support your biggest objectives across the entire business landscape with our innovative call tracking system.
  • 1
    HWiNFO

    HWiNFO

    Comprehensive Hardware Analysis, Monitoring and Reporting for Windows

    ... of various hardware-related parameters. Real-time monitoring of a variety of system and hardware parameters covering CPUs, GPUs, mainboards, drives, peripherals, etc. Useful for detection of overheating, overload, performance loss or failure prediction. Full hardware hierarchy, or quick summary overview. Export into XML, CSV, HTML reports. System monitoring in customizable tables, graphs, tray icons, OSD.
    Downloads: 225,294 This Week
    Last Update:
    See Project
  • 2
    Nikkho

    Nikkho

    Javier Gutiérrez Chamorro (Guti) Open source projects

    Javier Gutiérrez Chamorro (Guti) Open source projects Author's website: https://www.javiergutierrezchamorro.com
    Leader badge
    Downloads: 2,281 This Week
    Last Update:
    See Project
  • 3
    DAR - Disk ARchive

    DAR - Disk ARchive

    For full, incremental, compressed and encrypted backups or archives

    DAR is a command-line backup and archiving tool that uses selective compression (not compressing already compressed files), strong encryption, may split an archive in different files of given size and provides on-fly hashing, supports differential backup with or without binary delta, ftp and sftp protocols to remote cloud storage Archive internal's catalog, allows very quick restoration even a single file from a huge, eventually sliced, compressed, encrypted archive eventually located on...
    Leader badge
    Downloads: 123 This Week
    Last Update:
    See Project
  • 4
    Java Service Wrapper
    Configurable tool which allows Java applications to be installed and controlled like native NT or Unix services. Includes fault correction software to automatically restart crashed or frozen JVMs. Critical when app is needed 24x7. Built for flexibility.
    Leader badge
    Downloads: 22 This Week
    Last Update:
    See Project
  • Finance Automation that puts you in charge Icon
    Finance Automation that puts you in charge

    Tipalti delivers smart payables that elevate modern business.

    Our robust pre-built connectors and our no-code, drag-and-drop interface makes it easy and fast to automatically sync vendors, invoices, and invoice payment data between Tipalti and your ERP or accounting software.
  • 5
    Naeon

    Naeon

    The safest way to store private data in untrusted (cloud) environments

    Naeon is a secure cloud storage solution that uses unbreakable military-grade encryption and zero-knowledge privacy to protect confidential data in an untrusted environment. The data are encrypted using the AES 256-bit encryption algorithm with a randomly generated 128-character passphrase. Then, it is split into small pieces called chunks, which are obfuscated by adding random data to each chunk to make them unreadable and indecipherable to unauthorized individuals or processes. The...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    Loader For Apps

    tool for windows 10 and windows 11

    About project sortly: This is a system tool for WIndows 7 (like x86 on x64). It can be load registry files from 'reg' folder and when we closed it the regfiles restore from 'regback' folder. That is recommed for big memory and processor require Apps. Native x64 Build available now! Windows 8 local profile supported registry files. New x86-x64 Enterprise version Last build optimized for Windows 10 v1909 x64 / Windows 11 Beta (22000.120) you have to set manually autotaskfilter=true...
    Downloads: 9 This Week
    Last Update:
    See Project
  • 7
    Stuntman - STUN server and client

    Stuntman - STUN server and client

    High performance, production quality STUN server and client library

    New version 1.2. This is the code to STUNTMAN - an open source STUN server and client code by john selbie. Compliant with the latest RFCs including 5389, 5769, and 5780. Also includes backwards compatibility for RFC 3489. ICE and WebRTC ready. Version 1.2 compiles on Linux, MacOS, BSD, and Solaris. Supports the STUN protocol on both UDP and TCP for both IPv4 and IPv6. Windows binaries are also provided. Additional features are in development. This is a mirror of the code on...
    Downloads: 16 This Week
    Last Update:
    See Project
  • 8
    HD DRiVE-iNFO

    HD DRiVE-iNFO

    HD DRiVE-iNFO displays hdd and advanced output at Windows command line

    HD DRiVE-iNFO displays hdd data in simple output at Windows command line / shell (4NT and TCC), which is required for running. Some customization options and plain output for easy/fast reading of your system status. It also displays number of advanced info for those that need/require it. Main features: Displays local hdd's, networked drives, cd/dvd/bluray's, usb connected devices. Also displays additional info from all these different storage devices (dvd layers, network write access, usb...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    FTimes

    A forensic system baselining, searching, and evidence collection tool

    FTimes is a forensic system baselining, searching, and evidence collection tool. Its primary purpose is to gather and/or develop topographical information and attributes about specified directories and files in a manner conducive to intrusion and forensic analysis.
    Downloads: 5 This Week
    Last Update:
    See Project
  • Control remote support software for remote workers and IT teams Icon
    Control remote support software for remote workers and IT teams

    Raise the bar for remote support and reduce customer downtime.

    ConnectWise ScreenConnect, formerly ConnectWise Control, is a remote support solution for Managed Service Providers (MSP), Value Added Resellers (VAR), internal IT teams, and managed security providers. Fast, reliable, secure, and simple to use, ConnectWise ScreenConnect helps businesses solve their customers' issues faster from any location. The platform features remote support, remote access, remote meeting, customization, and integrations with leading business tools.
  • 10
    Aegis Implicit Mail (AIM)

    Aegis Implicit Mail (AIM)

    Send Mime and Smime Emails to Any Type of Mail Server

    Aegis Implicit Mail is a free and open source library which is designed to provide fast and developer friendly API to send emails using SMTP ports. Binaries are available in the form of NuGet package: https://www.nuget.org/packages/AIM Please check http://pki.tools/aim.html as well AIM Supports : * None Ssl Mails * Implicit Ssl Mails * Explicit Ssl Mails * Smtp Connection test * Detect Ssl type of mail server * Attachments for MIME and S/MIME message. * In-line attachment...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 11

    ftdetector

    File type detector library

    This project is a tool to detect file types by signatures and mime types. It uses hash tables to make the detection of a file type as fast as possible. The signature and mime types lists are stored at simple user-friendly files. This file type detector supports a lot of formats (image, archive, text, documents, audio, video, fonts and others). It also includes Microsoft OLE compound file types. The detector's algorythm has special features to detect text file types like (HTML, XML, JSON, etc...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    AIDE - Advanced Intrusion Detection Environment
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Ampare Windows 10 Full Shutdown

    Ampare Windows 10 Full Shutdown

    Full Shutdown For Your Windows 8 and Windows 10 PC

    Change From Visual Basic to Bat file to fix False Positive Detection Error This Software will use the old shutdown method of Windows that allow you to completely shutdown your pc . No hibernation or Fast Startup. Allow you to recovery file , Installing Dual Boot Linux and even more with just a click of this simple tools Donate us : http://www.juthawong.com/donate
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    ( pro ping )pinger network alert monitor

    ( pro ping )pinger network alert monitor

    Pinger alert, STATICTICAL TABLES, send EMAILs or SMS by SMS GATEWAY

    Thank you for your DONATIONS for Pinger alert, STATICTICAL TABLES, send EMAILs or SMS by SMS GATEWAY. Look on the tab files, select and download the version of the operating system that you need of this slight textual code that requires no system update. Network monitoring analyzer, network scanner with ping, traceroute and beeper alert and warning mail sender. Capable of scanning IP INFINIT, automatic detection of the source of network interruptions without GUI interface configurations. More...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 15
    Snort
    ** As of Snort 2.9.7.6, we are longer releasing Snort on SourceForge. Please head to http://www.snort.org from now on!** **As of June 2017, the mailing lists are no longer on SourceForge, and have moved to https://lists.snort.org** Snort is a libpcap-based sniffer/logger which can be used as a network intrusion detection and prevention system. It uses a rule-based detection language as well as various other detection mechanisms and is highly extensible.
    Leader badge
    Downloads: 4 This Week
    Last Update:
    See Project
  • 16
    Python2Path

    Python2Path

    Adds Python to the System PATH Environmental Variable.

    Python2Path adds Python to the System PATH Environmental Variable. It automatically removes all previous paths to Python, so it can also be used to update your PATH if you changed Python versions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Libnids - NIDS E-component, based on Linux kernel. This library provides IP defragmentation, TCP reassembly and port scan detection.
    Leader badge
    Downloads: 25 This Week
    Last Update:
    See Project
  • 18
    Command-line tool to check ADFs (Amiga Disk Files) for errors and viruses. A binary is included for Windows users; Linux users are advised to compile the application themselves. Might also compile under plain DOS; but BE WARNED! When you scan files already renamed by the TOSEC standard, consider that file names may become insanely long in no time. --UPDATE OCTOBER 2014-- This project is currently suspended! I can't currently find the time to fix/update anything with this program...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 19
    LibIDMEF is an implementation of the Internet Engineering Task Force (IETF), Intrusion Detection Exchange Format Charter Working Group (IDWG), draft standard Intrusion Detection Message Exchange Format (IDMEF) protocol.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Software repository of the hack://src project. Includes security related software for crypto, vulnerability/patch notification & management, and ultra low level system access for stealth forensics & intrusion detection or malware removal.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    GNUWire is a centrally managed, multi threaded file integrity checker / intrusion detection tool. It was written from the ground up with security, portability, scalability, performance and user interface in mind.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    ifchk is a tool for network interface promiscuous mode detection, interface management and traffic trend analysis.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    MIDAS is a Network Monitoring and intrusion detection server. It uses a distributed client/server model that allows it to scale to very large networks. As well its own client It supports both Netsaint plugins and Big Brother Clients.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Intrusion detection / "sticky" honey pot technology using virtual servers to detect and trap worms, hackers, and other malware. ***Historical use only - Active Development stopped***
    Downloads: 2 This Week
    Last Update:
    See Project
  • 25
    QuIDScor is a daemon software integrating Intrusion Detection Systems (IDS) and vulnerability assesment and management platforms. Today QuIDScor correlates and verifies Snort alerts against QualysGuard vulnerability assessment data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next