Full-stack observability with actually useful AI | Grafana Cloud
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
Create free account
Try Google Cloud Risk-Free With $300 in Credit
No hidden charges. No surprise bills. Cancel anytime.
Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
VPLE (Linux)
Vulnerable Pentesting Lab Environment
VPLE is an Intentionally Vulnerable Linux Virtual Machine. This VM can be used to conduct security training, test security tools, and practice common penetration testing Labs. In VPLE bunch of labs are Available.
NOTE:- "Only run in VMWare Pls Don’t run in VirtualBox"
Will also run on the ProxMox server to understand how to do it pls refer to the doc in the zip named "Cybersecurity Lab Deployment on Proxmox"
The default login...
Design and Implementation of the Singhal token based mutual exclusion
[ Design and Implementation of the Singhal token based mutual exclusion algorithm in kernel-space of FreeBSD ]
| Data & Network Security Lab (DNSL)
| Room 501, Floor 5,
| Department of Computer Engineering
| Sharif University of Technology
| Azadi Ave., Tehran, Iran
Vahid Khodabakhshi <vkhodabakhshi@ce.sharif.edu>
Vahid Ranjbar <vranjbar@ce.sharif.edu>
Also see the Acknowledgement file
Please send bugs to our e-mail
Badger is a multi-purpose program designed to make System Administrator tasks easier for all computer users. It is currently a Beta ready for testing. It currently runs on Mac and Linux. It must be run as root.
Computer Breaker is a network testing tool that allows networking administrators to test if a computer is vulnerable to malicious attacks. Using the Nessus scanner, computer-breaker scans the remote host and automaticaly exploits its vulnerabilities.