Showing 6 open source projects for "malware protection"

View related business solutions
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 1
    Two tools able to edit your ipfilter.dat . These tools are able to edit your ipfilter.dat in order to check for big ranges and to check adjacent ranges . From the creators of ipfilterX , Nexus23 Labs . - Updates in Progress -
    Downloads: 3 This Week
    Last Update:
    See Project
  • 2
    DarkLight Cover/Calibrator

    DarkLight Cover/Calibrator

    DIY project to build a cover, flat panel or combo flip-flat panel

    The DarkLight Cover/Calibrator (DLC) is a DIY project to build a motorized telescope cover, flat panel, or a combination flip-flat system. Its modular design supports various setups: a 12V light panel without a servo for a wall-mounted calibration panel, a servo-only cover for sky flats, or both integrated into a flip-flat mechanism. The DLC also includes optional dew heating to reduce extra equipment and cabling. With available drivers, it works with ASCOM or INDI. We’re excited to...
    Downloads: 21 This Week
    Last Update:
    See Project
  • 3
    Arduino Nano Dew Controller Pro (DIY)

    Arduino Nano Dew Controller Pro (DIY)

    Dew Controller Feature Rich

    A 3-channel fully automated Dew Controller (DIY project) based on Arduino Nano for telescopes. For $48 or less. (c) Copyright Robert Brown 2014-2025. All Rights Reserved. Permission is granted for personal and Academic use only. Code or portions of code may not be copied or used without appropriate credit given to author. A very popular project with over 48,000 downloads. There is a new ESP32 WiFi version at https://sourceforge.net/projects/esp32-dew-controller/ The older...
    Leader badge
    Downloads: 14 This Week
    Last Update:
    See Project
  • 4
    Whonix

    Whonix

    Whonix is an Anonymous Operating System.

    THIS IS NOT WHONIX'S HOMEPAGE. Please go to: https://www.whonix.org/ (This is only Whonix's sourceforge must-have project page.) Whonix is an operating system focused on anonymity, privacy and security. It's based on the Tor anonymity network, Debian GNU/Linux and security by isolation. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP. Whonix consists of two parts: One solely runs Tor and acts as a gateway, which we call...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 5
    Simple Software-restriction Policy

    Simple Software-restriction Policy

    Control which folders programs can be run from.

    A software policy makes a powerful addition to Microsoft Windows' malware protection. In particular, it is more effective against ransomware than traditional approaches to security. If you know about the Linux 'execute permission' bit then you'll understand what this is for. The mode of operation is somewhat different in that execute permission is granted to folders and subfolders rather than individual files, but the intention is the same, to stop undesirable or unknown software from launching unless you OK it. ...
    Downloads: 43 This Week
    Last Update:
    See Project
  • 6
    Advanced Persistent Security

    Advanced Persistent Security

    Advanced Persistent Threat Security

    The architecture of the system is integrated by different Fingerprinting mechanisms. The system is designed from a core that avoids the detection of sdhash and Memory analysis Built-in security, allows anonymous browsing by filtering requests external identification, Exit Tor Nodes and using the TOR Fingerprinting structure The system is designed to navigate without being detected or registered by any search engine or online platform denying all types of response to servers, The...
    Leader badge
    Downloads: 2 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB