Your top-rated shield against malware and online scams | Avast Free Antivirus
Browse and email in peace, supported by clever AI
Our antivirus software scans for security and performance issues and helps you to fix them instantly. It also protects you in real time by analyzing unknown files before they reach your desktop PC or laptop — all for free.
Free Download
Our Free Plans just got better! | Auth0
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Open Source Monitoring System for performance and availability.
..., cloud, virtual infrastructure (VMware, Hyper-V, XEN), Docker containers, applications, storage and hardware devices such as firewalls, proxies, databases, web servers or routers.
It's highly scalable (up to 2000 nodes with one single server), 100% web and with multi-tenant capabilities. It has a very flexible ACL system and several different graphical reports and user-defined control screens.
Master/node to gather and graph "everything" on your systems using Tobi Oetiker's rrdtool. It can optionally warn your surveillance software. This software package was originally called LRRD. The project. Please see http://munin-monitoring.org/
FWNUA (Free Windows Network User Accounting) runs silently in a Windows login script or GPO and collects data about user logins. FWNUA keeps track of the workstations logins so you don't have to!
FWNUA now supports syslog and Splunk! Look for the fwnua - syslog version in the files list. Use Splunk or your own syslog server with data mining tools to create a robust user tracking system.
Find our Spunk app on Splukbase: https://splunkbase.splunk.com/app/2773/
The WiKID Strong Authentication System is a public-key based two-factor authentication system. It is a flexible, extensible, and secure alternative to tokens, certs and passwords. Application & API support exists for Java, ASP, PHP, Ruby, OpenVPN, TACACS+, etc.
Read our eGuide on how to setup your network with two-factor authentication: http://www.wikidsystems.com/learn-more/two-factor-authentication-white-papers
MAG Server stands for Monitor And Graphing Server. [VM Appliance]
MAG is a combination of Linux, XYMon and Cacti all together in a virtual appliance ready to use. All 3 are solid pieces of software but when joined together they make a great tool to manage your network infrastructure and end systems.
The Squidworks MAG server is a CentOS 5.6 Linux distribution that has a customized XYmon Monitoring and Cacti Graphing servers installed, configured and ready to use. All the dirty work has been done for you. Browse the informative splash page, there you...
Do you know all devices connected to your IT network ? Do you know which software or hardware component is installed on a computer ? Are you able to deploy softwares or configuration scripts on your computers ? No, then Try OCS Inventory NG at http://www.ocsinventory-ng.org...
BASE is the Basic Analysis and Security Engine. It is based on the code from the Analysis Console for Intrusion Databases (ACID) project. This application provides a web front-end to query and analyze the alerts coming from a SNORT IDS system.
... language that is supported by the Programming-Language-Micro-Kernel support.
It even supports running multiple programming languages in a single piece of software.
Supported Languages are: (C,C++,C#,VB.NET,Java,Python,Ruby,Perl,PHP,Tcl or GO)
> Strategy: It takes 4 years to write a programming-language, but it only takes 4 weeks to insert a micro-kernel.
The package-item is connected to one another via a pipe or a socket and is based on packets .
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Easy, modular and flexible WAMP bundling Apache2/SSL, MySQL4, PHP4, Perl5.8/ASP, Python2.3, Tomcat5, FirebirdDB, FileZilla, Mail/News-Server, phpMyAdmin, Awstats, WordPress, etc. It also includes a web-GUI to control/manipulate all bundled services.