Broaden your selection: Category/Protocol
- AT Emulator
- The AT Emulator is a free tool, which can be used to emulate a communication device, like a modem. The AT interface can be accessed through the console, a TCP or telnet connection or a virtual COM port. The emulator is implemented in Java, it can be used in Windows or GNU/Linux.
- Firewall is a set of scripts (firewall, fwup and fwdown) that implement one or more ipchains firewalls that support various forms of network address and port translation. All you have to do is read the heavily documented policy file and edit it to reflect your network topology and filtering policy.
- NMIS performs multiple network management functions from the OSI Model and International Organization for Standardization FCAPS model, these being - Fault, Configuration, Accounting and/or Administration, and Performance. These metrics provide valuable capabilities and features for fault and performance management, which in turn are useful for many other aspects of network and business management. NMIS monitors the status and performance of an organization’s IT environment, assists in rectification and identification of faults and provides valuable information for IT departments to plan expenditure and IT changes. The NMIS business rules engine classifies events on their business impact, not just the technical nature. The rules engine is extremely powerful; however it can be configured in minutes for a network with a small number of devices to hours for networks with large numbers of devices.
- Pac manager
- PAC Manager is a secure connection manager with automatiions, which make it good GNU/Linux and free software replacement for SecureCRT and Putty. Some features include:
- Simple GUI to manage/launch connections to remote machines.
- Scripting possibilities, 'ala' SecureCRT
- Configurable Pre
- Zorp is a new generation proxy firewall suite and as such its core architecture is built around today's security demands: it uses application level proxies, it is modular and component based, it uses a script language to describe policy decisions, it makes it possible to monitor encrypted traffic, it let's you override client actions, it let's you protect your servers with its built in IDS capabilities... The list is endless. It gives you all the power you need to implement your local security policy.
Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the page “GNU Free Documentation License”.
The copyright and license notices on this page only apply to the text on this page. Any software or copyright-licenses or other similar notices described in this text has its own copyright notice and license, which can usually be found in the distribution or license text itself.