Semantic search

Jump to: navigation, search
Search

Edit query Show embed code

The query [[Protocol::ip]] was answered by the SMWSQLStore3 in 0.0044 seconds.


Results 11 – 20    (Previous 10 | Next 10)   (20 | 50 | 100 | 250 | 500)   (JSON | CSV | RSS | RDF)


Linphone
Linphone is an Internet phone or Voice Over IP phone (VoIP). It lets you make two-party phone calls using the Internet.
NMIS
NMIS performs multiple network management functions from the OSI Model and International Organization for Standardization FCAPS model, these being - Fault, Configuration, Accounting and/or Administration, and Performance. These metrics provide valuable capabilities and features for fault and performance management, which in turn are useful for many other aspects of network and business management. NMIS monitors the status and performance of an organization’s IT environment, assists in rectification and identification of faults and provides valuable information for IT departments to plan expenditure and IT changes. The NMIS business rules engine classifies events on their business impact, not just the technical nature. The rules engine is extremely powerful; however it can be configured in minutes for a network with a small number of devices to hours for networks with large numbers of devices.
NNCP
NNCP (Node to Node copy) is a collection of utilities simplifying secure store-and-forward files, mail and commands exchanging. This utilities are intended to help build up small size (dozens of nodes) ad-hoc friend-to-friend (F2F) statically routed darknet delay-tolerant networks for fire-and-forget secure reliable files, file requests, Internet mail and commands transmission. All packets are integrity checked, end-to-end encrypted (E2EE), explicitly authenticated by known participants public keys. Onion encryption is applied to relayed packets. Each node acts both as a client and server, can use push and poll behaviour model. Out-of-box offline sneakernet/floppynet, dead drops, sequential and append-only CD-ROM/tape storages, air-gapped computers support. But online TCP daemon with full-duplex resumable data transmission exists.
Nodewatcher
nodewatcher is one of the projects of wlan slovenija open wireless network. Its main goal is the development of a network planning, deployment, monitoring and maintenance platform with emphasis on community.
Pac manager
PAC Manager is a secure connection manager with automatiions, which make it good GNU/Linux and free software replacement for SecureCRT and Putty. Some features include:
  • Simple GUI to manage/launch connections to remote machines.
  • Scripting possibilities, 'ala' SecureCRT
  • Configurable Pre
Paraslash
The paraslash package contains server and client software for network audio streaming and stand-alone utilities for decoding and playing audio files.
Privoxy
Privoxy is a Web proxy based on Internet Junkbuster with advanced filtering capabilities for protecting privacy, filtering Web page content, managing cookies, controlling access, and removing ads, banners, pop-ups, and other obnoxious Internet junk. It is useful for both stand-alone systems and multi-user networks.
Sltd
sltd daemonizes multiple slt instances to accept TLS/SSL connections on multiple ports, each one to forward traffic to different backend hosts depending on the intended destination. sltd works as a multiprotocol reverse proxy without adding nor rewriting service data (such as X-Forwarded-For header).
Wograld
Wograld is a 2d 45 degree isometric multi-player online rpg. It is in development with many gameplay features not yet implemented. It is a fork of crossfire with mostly redone graphics and some gameplay changes to make it more fun and newbie friendly.
Zorp
Zorp is a new generation proxy firewall suite and as such its core architecture is built around today's security demands: it uses application level proxies, it is modular and component based, it uses a script language to describe policy decisions, it makes it possible to monitor encrypted traffic, it let's you override client actions, it let's you protect your servers with its built in IDS capabilities... The list is endless. It gives you all the power you need to implement your local security policy.


Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the page “GNU Free Documentation License”.

The copyright and license notices on this page only apply to the text on this page. Any software or copyright-licenses or other similar notices described in this text has its own copyright notice and license, which can usually be found in the distribution or license text itself.