MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
Start Free
Our Free Plans just got better! | Auth0
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
A small utility written in Java that helps you extract songs from your iPod, by searching inside its hidden folders for the song, artist or album that you want.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Java program to extract postings and comments from http://www.livejournal.com (blog) into DB and view/classify/process it. LJ loader. Components to reuse: perl-like, but efficient Web pages scraper, trees analyzer, concurrent scheduler.
Extract SNMP information via PHP web interface to monitor and optionally create MRTG graphs for the following vendors:
Lucent's LSMS, Bluecoat, Zoom Routers, Windows, Allot, Fortinet, Cyclades, RMON and any device that support standard MIB2 MIBS
adcfw-log is a tool for analyzing firewall logs in order to extract meaningful information and generate different kinds of reports, such as fully formatted reports of what had been logged, with summaries by source or destination host, the type of service
Extract mails from qmail queue log. The idea of this utility is to use the queue log for backups restoring messages in maildir format, it considers the time to handle tapes and try to optimize restoring lists of boxes.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
This utility is used to manipulate Minix filesystem images in user-space. It can be used to extract files and generate full images for using in embedded system and/or Linux init ram disks.
Jxtray is a database explorer written in Java. Jxtray can be used to connect to any type of database with suitable JDBC drivers. It can provide you with information regarding your data bases and extract data in the following formats: CSV, SQL, HTML, XML
Batch Renaming Utility - GUI and console tool for batch renaming using user defined templates. User templates can contain 'user tags`to extract `file ACM DateTime, Exif and Id3 information. bren - is written using wxWidgets framework.
isosteg use the steganography to insert or extract data into any iso9660 filesystem image without damage the legacy data. Is usefull to test if a burned iso9660 cd-rom contain steganographied data.
pblogan (Phone Box LOG ANalyzer)
A set of perl scripts that extract information from a Panasonic Phone Box via serial port, and upload them to a Postgres Database which is queried by several php pages.
The core_fonts package contains Microsoft's "Core Fonts for the Web" as well as
a script to extract and install the fonts, making them available to the X font server.
Once the script has been run, the fonts should be available for use.
tcpslice is a tool for extracting portions of packet trace files generated using tcpdump's -w flag. It can combine multiple trace files, and/or extract portions of one or more traces based on time.
A tool to manage configurations of network devices in CVS, such as Cisco routers and switches, 3COM equipment, and more. Uses a combination of perl and TCL to extract configuration, and dump into a repository. Modules are easily written to support new d
Payload Delivery Vehicle (PDV) is a program that builds an executable that contains a complete package (e.g. and RPM, System V package or tar file) and the commands required to install it. When the executable is run it will extract and execute the payloa
Blaster Scan is a TCP port scanner. It can extract users exploiting vrfy or expn, check anonymous access on FTP, check brute force on FTP and POP3, extract daemons\' versions, and scan for CGI bugs. It also has a SYN port scan, the ability to ping hosts t
If using ADSL one is getting various log entries in the standard Linux systems message file. Goal is to extract this information to a HTML-Web Site using Perl-Libs. Details - see on our homepage. http://adsllog2web.sourceforge.net
This program gathers a set of unix scripts to allow you to create software install recipes. The scripts then download, extract, and compile the source using user-configured options
A tool to extract the information in any log file into a database. It has no inherent knowledge of particular log formats but by using inbuilt rules and asking a few simple questions should be able to parse any type of text log intelligently.