Are You Human? is a script that uses a graphical test to insure that a human is being dealt with rather than a script. This is useful to avoid automated Web signups or automated attempts to crack passwords. There are many equivalent libraries for other languages but this is the first one for Python. The Python Imaging Library (PIL) is required.
The Argus Open Project is focused on developing network activity audit strategies that can do real work for the network architect, administrator and network user. Argus is a fixed-model Real Time Flow Monitor designed to track and report on the status and performance of all network transactions seen in a data network traffic stream. It provides a common data format for reporting flow metrics such as connectivity, capacity, demand, loss, delay, and jitter on a per transaction basis.
Arri provides an interface for accessing arrays in a safe manner that means that it is impossible to cause an overflow and, if the array is set to hard (it normally is), truncation. In addition to simply providing an interface for handling arrays, it also provides interfaces for using the arrays such as an IO API.
Arudius is a live CD Linux distribution based on Slackware (Minislack/Zenwalk) and Linux Live scripts. It contains an extensive set of software tools used by information security professionals for information assurance and vulnerability analysis. Its goal is to include the most complete set of useful security tools and still maintain a small footprint so it can fit on a 210MB mini-CD.
Astaro Command Center (ACC) is an application for centralized management of Astaros gateway products. With ACC, network administrators can easily manage and control multiple Astaro devices. The two separated Web-Based GUIs (WebAdmin and Gateway Manager) enable the split of ACC-system administration and role-based Gateway monitoring and can be also implemented in existing Active Directory or eDirectory environments. ACC provides an effective overview that details the actual health of each device, swiftly allowing administrators to see which gateways require more attention or immediate action (by reason of e.g. threat level, license, or CPU/memory/disk usage). A VPN configuration feature offers the ability to set up an IPSec tunnel between managed devices very easily from a central point. Over the one-click WebAdmin SSO to each connected gateway, it is possible to react instantly if necessary.
Astaro Portscan Detection is a netfilter target which will attempt to detect TCP and UDP port scans and log them to syslog. This target is based upon Solar Designer's scanlogd. It suppports mutliple levels of logging, custom prefixes for entries, weighted total port scan detection, and port scan temporal spread detection.
Astaro Security Gateway (formerly Astaro Security Linux) is an all-in-one network security gateway that includes a firewall, intrusion protection, antivirus, spam protection, URL filtering, and a VPN gateway. Features include a modern packet filter, intrusion detection and prevention, portscan detection, application control, content filtering, virus detection for email and Web traffic, profile handling, L2TP, IPSec, SSL, and PPTP VPN tunneling, spam blocking, proxies for HTTPS, HTTP, FTP, POP3, SMTP, DNS, VoIP, SOCKS, and Ident, logging, and reporting. It supports Ethernet, VLAN, PPP, PPPoE, PPPoA, Cable Modem, IPv6, QoS, Link Aggregation, and WAN-Uplink-Load balancing in routing, and bridge mode. The WebAdmin GUI, Install Wizard, Change Tracking, Printable Configuration, and Up2Date service make it easy to install, manage, and maintain.
AstroFlow Bandwidth Management is a bandwidth management solution that features reports and many configuration options. With little or no knowledge of bandwidth management and packet shaping, it is possible to manage the traffic on your network, prioritize certain protocols such as POP3, SMTP, or databases, and guarantee that all mission-critical applications will have bandwidth available to them at all times, regardless of what other protocols are doing on your network.
The Auditor security collection is a live-system based on KNOPPIX. It provides tools for analyzing the security of a system. It features a menu structure that reflects the stages of a security check: foot-printing, analysis, scanning, wireless, brute-forcing, cracking. In addition to about 300 security tools, the collection includes background information regarding standard configuration and passwords, truly extensive word lists, and more mundane productivity tools.