2822 projects tagged "Networking"

Download Website Updated 02 Jun 2014 CGIProxy

Screenshot
Pop 966.04
Vit 118.33

CGIProxy is a Perl CGI script that acts as an Internet proxy. Through it, you can retrieve resources that may be inaccessible from your own machine. The user is kept as anonymous as possible from any servers. HTTP and FTP are supported, and optionally SSL. Common uses include censorship circumvention, VPN-like setups, anonymous proxies, personal proxies, and others. Options include text-only browsing (to save bandwidth), selective cookie and script removal, simple ad filtering, access restriction by server, encoded target URLs and cookies, configuration by end user, and much more (currently over 70 config options). Javascript and Flash are fully supported. Messages are in 14 languages so far. Can be installed as a CGI script, a mod_perl script, a FastCGI script, or with its own embedded secure HTTP server. An online demo is available.

No download No website Updated 30 May 2014 C-ICAP Classify

Screenshot
Pop 75.84
Vit 6.88

C-ICAP Classify is a module that allows classification (labeling) of Web pages, images, and soon video based on content. Labels are placed in HTTP headers. Any PIC-Label META tags are exported into HTTP headers. This allows for creation of very flexible filters according to rules defined by the user, using the ICAP enabled proxy's ACLs. It is not a URL filter, so implementing it with sslBump or similar proxy technologies makes it very difficult to bypass. Text classification is done using Fast Hyperspace (based on Hyperspace from CRM114) and/or a Fast Naive Bayes. Image and video (when implemented) use haar feature detection from the OpenCV library.

No download No website Updated 27 May 2014 BGPHist

Screenshot
Pop 92.00
Vit 8.15

BGPHist is a tool that receives MP-BGP updates, decodes them, and writes them to a database for logging and monitoring purposes. It support not only Internet routes, but also these address families: IPv4 multicast, IPv4 labeled unicast, VPNv4 unicast, IPv6 unicast, IPv6 labeled unicast, VPNv6 unicast, L2VPN VPLS-VPWS, and IPv4 MVPN. It supports text output, MySQL databases, and Oracle databases. For the MySQL backend, there is also a simple PHP frontend. It could be used to monitor and log an ISP's customer activity for Internet and VPNs, as a passive BGP looking glass, or as a backend for some external monitoring and accounting system.

Download Website Updated 25 May 2014 web2ldap

Screenshot
Pop 1,155.27
Vit 199.93

web2ldap is a full-featured Web-based LDAPv3 client written in Python. It is designed to run either as with stand-alone built-in Web server or under the control of another Web server with FastCGI support (e.g. Apache with mod_fastcgi). It has support for various LDAPv3 bind methods and a powerful built-in schema browser. HTML templates are supported for displaying and editing entries, and LDIF templates can be used for quickly adding new entries. A built-in X.509 parser displays a detailed view of certificates and CRLs with active links.

Download Website Updated 22 May 2014 Collax Business Server

Screenshot
Pop 344.76
Vit 16.59

Collax Business Server is an all-in-one Linux server for small- and medium-sized businesses. It delivers all the important network services within a heterogeneous business environment for communication, infrastructure, compliance, groupware, and storage, all in a reliable and secure way which is easy to manage. It also provides essential security functions such as firewalling and virus and spam filtering, to protect against hacker attacks, viruses, and unsolicited email messages.

Download Website Updated 22 May 2014 Collax Security Gateway

Screenshot
Pop 82.60
Vit 1.44

The Collax Security Gateway is a Unified Threat Management (UTM) Solution for small- and medium-sized businesses. It includes an easy to configure stateful inspection firewall, email security features including anti-spam and anti-virus, Internet access control, Internet SSL interception, Internet networking optimization tools, Internet network fault tolerance, clientless VPN technology, and remote administration.

Download Website Updated 22 May 2014 Babel Router

Screenshot
Pop 308.46
Vit 68.22

Babel is a distance-vector routing protocol for IPv6 and IPv4. It is designed to be robust and work efficiently on both wired networks and wireless mesh networks.

Download Website Updated 21 May 2014 rdesktop

Screenshot
Pop 909.57
Vit 50.48

rdesktop is an open source client for the Remote Desktop Protocol (RDP), which is used in a number of Microsoft products including Windows NT Terminal Server, Windows 2000 Server, Windows XP, Windows 2003 Server, and Windows 2008 R2 Server. rdesktop currently runs on Linux and other Unix based platforms with the X Window System.

Download Website Updated 21 May 2014 S tar

Screenshot
Pop 732.96
Vit 157.18

Star is a very fast, POSIX-compliant tar archiver, maintained for more than 30 years. It saves many files together into a single tape or disk archive, and can restore individual files from the archive. It includes command line interfaces for the "tar", "Sun-Tar", "cpio", "pax", and "gnutar" command-line syntax. It includes a FIFO for speed, a pattern matcher, multi-volume support, the ability to archive sparse files and ACLs, the ability to archive extended file flags, automatic archive format detection, automatic byte order recognition, automatic archive compression/decompression, remote archives, and special features that allow star to be used for full and incremental backups. It includes the only known platform independent "rmt" server program.

Download Website Updated 21 May 2014 Tor-ramdisk

Screenshot
Pop 463.13
Vit 55.42

Tor-ramdisk is a uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Security is enhanced in tor-ramdisk by employing a monolithically compiled GRSEC/PAX patched kernel and hardened system tools. Privacy is enhanced by turning off logging at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key, which may be exported and imported by FTP or SSH.

Screenshot

Project Spotlight

builders

A framework for creating games based on Settlers.

Screenshot

Project Spotlight

GNU Moe

A powerful and user-friendly console text editor.