Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Start Free
Application Monitoring That Won't Slow Your App Down
AppSignal's Rust-based agent is lightweight and stable. Already running in thousands of production apps.
Full APM with errors, performance, logs, and uptime monitoring. 99.999% uptime SLA on the platform itself.
This is a apache v2.0 authentication module. Based on html form authentication and cookie authentication session. Cookie session are stored in memcache deamon. Can be used has an simple "Single Signe-On" (SSO).
All the code source and the bug tracking has migrated to github:
https://github.com/ZenProjects/Apache-Authmemcookie-Module
All the documentation are here:
https://zenprojects.github.io/Apache-Authmemcookie-Module/
The WiKID Strong Authentication System is a public-key based two-factor authentication system. It is a flexible, extensible, and secure alternative to tokens, certs and passwords. Application & API support exists for Java, ASP, PHP, Ruby, OpenVPN, TACACS+, etc.
Read our eGuide on how to setup your network with two-factor authentication: http://www.wikidsystems.com/learn-more/two-factor-authentication-white-papers
Framework for making Windows applications that are one .exe file in AutoHotKey_L,C++,C#, VB.NET,Java,Groovy,Common Lisp,Nemerle,Ruby,Python,PHP,Lua,Tcl,Perl,Jint,S#,WSH VBScript,HTML/JavaScript/CSS,COM, PowerShell without compiling . For .NET 4.
Paglo Crawler discovers all devices connected to a network - including workstations, servers, switches, routers, printers, etc and gathers rich information about each device. This information is then searchable through an account at http://paglo.com/
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
Ruby/LDAP is an extension library for Ruby. It provides the interface to some LDAP libraries (e.g. OpenLDAP, Netscape SDK and Active Directory). The common API for application development is described in RFC1823 and is supported by Ruby/LDAP.
RogueScanner is a network security tool for automatically discovering rogue wireless access points by scanning a wired network. In addition to finding access points, it will classify all discovered network devices
This tool runs as a window service to start and stop rails server on a path and port specified in the .config "C:|Program Files|MA|Rails App Launcher" file on the windows OS.
slink-n-up is a one-stop dashboard of your Linux servers' status. You can immediately see any problems, such as: network connectivity loss, service outages, and so forth. Performing changes to all the servers at once is effortlessly handled.
Ruby/MaxL is a portable extension module for the Ruby scripting language that allows Hyperion Essbase MaxL statements to be executed from within a Ruby program.
Lucie enables parallel network installation of large numbers of nodes from one single administration server. It is designed to be scalable and efficient, so a complete Linux cluster can be built from scratch in a short amount of time.
The purpose of SNX is to have a modular series of components that report back to a central repository and 'AI' for pattern recognition and anomoly detection. This is to help with IDS systems, and to move to the next generation of security.
A software distribution based on Debian/Linux to provide network diagnostics, security monitoring and intrusion detection. The distribution can be easily installed by office personnell.
LinuxBSM-2 introduces auditing features in Linux kernel to achieve better security and keep an eye on system activities.
Any kernel-derived data can be audited.