Updated: 2012-12-31 15:46:36
login_keepalived is a daemon that keeps remote
terminal (SSH) sessions alive, preventing them from
being cut off by TCP timeouts. It can be run as a
global daemon for all remote sessions, or in
private mode for a single session.Release Notes: A compile warning was fixed. The build system (autoconf) was updated. Documentation was improved. Source code is now on Github.
Release Tags: minor bug fixes, Improved documentation
Tags: Terminals, Utilities
Licenses: GPL
Updated: 2012-12-31 13:38:34
Login Signup Lost password Home Articles Browse Projects by Tag Submit new Project About Blog Help Sites All Mac OS X Mobile Unix Projects Devil-Linux Devil-Linux Devil-Linux is a special secure Linux distribution which is used for firewalls , routers , gateways , and servers . The goal of Devil-Linux is to have a small , customizable , and secure Linux system . Configuration is saved on a floppy disk or USB stick , and it has several optional packages . Devil-Linux boots from CD , but can be stored on CF cards or USB sticks . Tags Networking Firewalls Security Operating Systems Linux Distributions CD-Based Licenses GPL Operating Systems POSIX Linux Website Tweet Release tags All releases Recent releases 1.6.3 31 Dec 2012 22:06 Release : Notes This release brings many software updates in
Updated: 2012-12-29 14:36:36
Kiwix is an offline reader for Web contents based on the ZIM file format. It uses the Mozilla framework and integrates a full-text search engine. For example, this software allows you to read Wikipedia offline.Release Notes: This is a new release candidate with a lot of bugfixes and a new HTTP server feature for all
systems.
Tags: Wikipedia offline reader ZIM
Licenses:</strong GPLv3
Updated: 2012-12-29 14:31:56
XRoar is a cross-platform emulator for the Dragon 32, Dragon 64, and Tandy CoCo computers, all originally released in the early '80s. The emulator runs under Unix-like operating systems (including Mac OS X) and Windows, with older versions available for handhelds like the Nintendo DS and GP32.Release Notes: This release adds
Hitachi 6309 emulation,
VDG sub-scanline rendering improvements,
an optional "Becker port" in RSDOS,
timing fixes,
and keyboard matrix ghosting simulation.
</p
Tags: Emulators
Licenses: GPL v2 Or Later
Updated: 2012-12-29 10:14:17
Login Signup Lost password Home Articles Browse Projects by Tag Submit new Project About Blog Help Sites All Mac OS X Mobile Unix Projects TUTOS TUTOS TUTOS The Ultimate Team Organization Software is a groupware , ERP Enterprise Resource Planing CRM Customer Relationship Management and PLM Project Lifecycle Management suite that helps small to medium teams manage various things in one place . Its features include personal and group calendars , an address book , product and project management , bug tracking , installation management , test management , scrum management , a task list , notes , files , mailboxes , and useful links between all of the . above Tags Database Front-Ends Internet Web Dynamic Content Office Business Scheduling Software Development Bug Tracking groupware scrum tools
Updated: 2012-12-28 19:36:23
Login Signup Lost password Home Articles Browse Projects by Tag Submit new Project About Blog Help Sites All Mac OS X Mobile Unix Projects samhain samhain samhain is a daemon that can check file integrity , search the file tree for SUID files , and detect kernel module rootkits Linux only It can be used either standalone or as a client server system for centralized monitoring , with strong 192-bit AES encryption for client server connections and the option to store databases and configuration files on the server . For tamper resistance , it supports signed database configuration files and signed reports audit logs . It has been tested on Linux , FreeBSD , Solaris , AIX , HP-UX , and Unixware . Tags Security Licenses GPL Operating Systems POSIX Implementation C Website Download Tweet
Updated: 2012-12-28 18:20:54
librangetree is a C++ template, implementing a 2D range tree for both counting and reporting queries. It is just about the fastest way to do 2D searches.Release Notes: First public release.
Tags: Library, data
Licenses: AGPLv3
Updated: 2012-12-28 16:23:08
Login Signup Lost password Home Articles Browse Projects by Tag Submit new Project About Blog Help Sites All Mac OS X Mobile Unix Projects Drupal Drupal Drupal is a modular content management system , forum , blogging and community engine . It is database driven and can be used with MySQL , MySQLi , PostgreSQL , and SQLite . Its features include but are not limited to discussion forums , Web-based administration , theme support , a submission queue , content rating , content versioning , taxonomy support , user management with a fine-grained permission system based on user roles groups error logging , support for content syndication , locale support , and much more . It is considered to be an excellent platform for developers due to its clean code and extensibility , and it can also be
Updated: 2012-12-28 13:34:41
MailSnail is a little game, mainly aimed at kids, in which you guide Snailly by placing food, collect the letters before Esnail and deliver them, and watch out for carnivorous plants and other nasties.
Release Notes: This is the first release.
Tags: arcade game, kids games, Puzzle Game
Licenses: GPLv2
Updated: 2012-12-28 09:47:06
lrc (The Linux Resource Compiler) is a system for packing many files into a single file for installation and use in a program as its resources (such as the graphics and sounds used by a game). It consists of a command-line tool, called lrc, for compiling the resources and a library, called liblrc, to extract the resources from a file generated by the compiler.Release Notes: This is the first release candidate for version 1.0.
Release Tags: RC, Minor
<pTags: Programming - Components and Libraries, Programming - Tools
Licenses: LGPL v3
Updated: 2012-12-28 00:13:14
AlphaLemon CMS is a content management system built on top of the Symfony2 framework. It is designed to make it as easy as possibile to manage a Web site without requiring programming or a large learning curve, while giving developers a robust and flexible framework on which to build Web applications and distributable extensions.Release Notes: First stable release.
Release Tags: Stable
Tags: Content Management System, CMS, Symfony2, Symfony
Licenses: GPLv2
Updated: 2012-12-28 00:10:47
jHyenae is an entirely-overworked Java port of the low-level network packet generator Hyenae. Besides a clean and intuitive UI, it features full range protocol layer configuration and a steadily-growing variety of supported packet generators.
Release Notes: This release has UI enhancements, raw data injection, and a TCP generator.
Tags: Packet Generator, Packet Crafter, DOS, DDoS, MITM, Traffic Generator
Licenses: GPL v3
Updated: 2012-12-27 19:38:13
Login Signup Lost password Home Articles Browse Projects by Tag Submit new Project About Blog Help Sites All Mac OS X Mobile Unix Projects amforth amforth amforth is an extendible command interpreter for the Atmel AVR ATmega microcontroller family . It has a turnkey feature for embedded use as well . It does not depend on a host application . The command language is an almost compatible ANS94 forth with extensions . It needs less than 8KB code memory for the base system . It is written in assembly language and forth . itself Tags Operating System Kernels Operating Systems Hardware Scientific Engineering Software Development Embedded Systems Licenses GPLv2 Operating Systems Unix Windows macos Implementation Forth Assembly Website Download Tweet Release tags All releases Recent releases 5.0
Updated: 2012-12-27 13:33:07
Login Signup Lost password Home Articles Browse Projects by Tag Submit new Project About Blog Help Sites All Mac OS X Mobile Unix Projects Sally Sally Sally is a tool for mapping a set of strings to a set of vectors . This mapping is referred to as embedding and allows techniques of machine learning and data mining to be applied for the analysis of string data . It can be used with data such as text documents , DNA sequences , or log files . The vector space model or bag-of-words model is used . Strings are characterized by a set of features , where each feature is associated with one dimension of the vector space . Occurrences of the features in each string are counted . Alternatively , binary or TF-IDF values can be computed . Vectors can be output in plain text , LibSVM , or Matlab .
Updated: 2012-12-27 13:31:00
Login Signup Lost password Home Articles Browse Projects by Tag Submit new Project About Blog Help Sites All Mac OS X Mobile Unix Projects Malheur Malheur Malheur is a tool for the automatic analysis of malware behavior program behavior recorded from malicious software in a sandbox environment It is designed to support the regular analysis of malicious software and the development of detection and defense measures . It allows for identifying novel classes of malware with similar behavior and assigning unknown malware to discovered classes . It can be applied to recorded program behavior of various formats as long as monitored events are separated by delimiter symbols , e.g . as in reports generated by the popular malware sandboxes CWSandbox , Anubis , Norman Sandbox , and . Joebox Tags
Updated: 2012-12-27 00:40:33
Jitac is a Java application that converts images into ASCII art by associating blocks of the image with ASCII characters. It supports several image formats (GIF, JPEG, TIFF, and PNG) and some image manipulations that can be performed before the conversion (inversion, grayscale, resize, and gamma correction).Release Notes: This release is under the GPLv3.
Tags: multimedia, Graphics, Graphics Conversion
Updated: 2012-12-22 00:50:11

Menu Skip to content Post navigation Mobile Application Security Flaw : Excessive Permissions and Privileges Cybersecurity to Become White House Focus in the New Year Posted on December 21, 2012 by Cenzic , . Inc After two attempts earlier this year by the US Congress to pass the Cybersecurity Act of 2012 CSA 2012 the Executive Branch is taking steps toward a Presidential Cybersecurity Order to protect the countryâ s digital systems from hackers and . spies According to The Hill the Order could be issued as early as January 2013. Politico  reported that the White House held meetings with representatives from tech trade associations , the U.S . Chamber of Commerce , privacy groups and think tanks throughout the Fall to hear their recommendations for the Executive . Order So what might
Updated: 2012-12-22 00:49:56

Menu Skip to content Post navigation Cybersecurity to Become White House Focus in the New Year Posted on December 21, 2012 by Cenzic , . Inc by Cenzic , Inc . After two attempts earlier this year by the US Congress to pass the Cybersecurity Act of 2012 CSA 2012 the Executive Branch is taking steps toward a Presidential Cybersecurity Order to protect the countryâ s digital systems from hackers and . spies According to The Hill the Order could be issued as early as January 2013. Politico  reported that the White House held meetings with representatives from tech trade associations , the U.S . Chamber of Commerce , privacy groups and think tanks throughout the Fall to hear their recommendations for the Executive . Order So what might be in the Executive Order It’s not entirely clear as
Updated: 2012-12-22 00:49:15

Menu Skip to content Category Archives : application security news Post navigation Older posts Cybersecurity to Become White House Focus in the New Year Posted on December 21, 2012 by Cenzic , . Inc by Cenzic , Inc . After two attempts earlier this year by the US Congress to pass the Cybersecurity Act of 2012 CSA 2012 the Executive Branch is taking steps toward a Presidential Cybersecurity Order to protect the countryâ s digital systems from hackers and . spies According to The Hill the Order could be issued as early as January 2013. Politico  reported that the White House held meetings with representatives from tech trade associations , the U.S . Chamber of Commerce , privacy groups and think tanks throughout the Fall to hear their recommendations for the Executive . Order So what
Updated: 2012-12-22 00:49:13

Menu Skip to content Tag Archives : cyber risk Post navigation Cybersecurity to Become White House Focus in the New Year Posted on December 21, 2012 by Cenzic , . Inc by Cenzic , Inc . After two attempts earlier this year by the US Congress to pass the Cybersecurity Act of 2012 CSA 2012 the Executive Branch is taking steps toward a Presidential Cybersecurity Order to protect the countryâ s digital systems from hackers and . spies According to The Hill the Order could be issued as early as January 2013. Politico  reported that the White House held meetings with representatives from tech trade associations , the U.S . Chamber of Commerce , privacy groups and think tanks throughout the Fall to hear their recommendations for the Executive . Order So what might be in the Executive Order
Updated: 2012-12-22 00:49:11

Menu Skip to content Tag Archives : cybersecurity Post navigation Cybersecurity to Become White House Focus in the New Year Posted on December 21, 2012 by Cenzic , . Inc by Cenzic , Inc . After two attempts earlier this year by the US Congress to pass the Cybersecurity Act of 2012 CSA 2012 the Executive Branch is taking steps toward a Presidential Cybersecurity Order to protect the countryâ s digital systems from hackers and . spies According to The Hill the Order could be issued as early as January 2013. Politico  reported that the White House held meetings with representatives from tech trade associations , the U.S . Chamber of Commerce , privacy groups and think tanks throughout the Fall to hear their recommendations for the Executive . Order So what might be in the Executive Order
Updated: 2012-12-22 00:49:10

Menu Skip to content Tag Archives : government Post navigation Cybersecurity to Become White House Focus in the New Year Posted on December 21, 2012 by Cenzic , . Inc by Cenzic , Inc . After two attempts earlier this year by the US Congress to pass the Cybersecurity Act of 2012 CSA 2012 the Executive Branch is taking steps toward a Presidential Cybersecurity Order to protect the countryâ s digital systems from hackers and . spies According to The Hill the Order could be issued as early as January 2013. Politico  reported that the White House held meetings with representatives from tech trade associations , the U.S . Chamber of Commerce , privacy groups and think tanks throughout the Fall to hear their recommendations for the Executive . Order So what might be in the Executive Order
Updated: 2012-12-22 00:49:08

Menu Skip to content Post navigation Mobile Application Security Flaw : Excessive Permissions and Privileges Cybersecurity to Become White House Focus in the New Year Posted on December 21, 2012 by Cenzic , . Inc After two attempts earlier this year by the US Congress to pass the Cybersecurity Act of 2012 CSA 2012 the Executive Branch is taking steps toward a Presidential Cybersecurity Order to protect the countryâ s digital systems from hackers and . spies According to The Hill the Order could be issued as early as January 2013. Politico  reported that the White House held meetings with representatives from tech trade associations , the U.S . Chamber of Commerce , privacy groups and think tanks throughout the Fall to hear their recommendations for the Executive . Order So what might
Updated: 2012-12-22 00:49:07

: Menu Skip to content Post navigation Mobile Application Security Flaw : Input Validation Mobile Application Security Flaw : Excessive Permissions and Privileges Posted on December 21, 2012 by Sameer Dixit Excessive permissions and privileges is one of the most common and serious vulnerability that is creating great deal of privacy concerns among smart phone . users Applications with more access are often the target for attackers because of its broad attack surface . Most of the mobile applications residing on the mobile devices have more than required access permissions and privileges on the device . Such as , access to userâ s contact list and update rights without notifying user , Receiving sending SMS messages , Location recording userâ s GPS coordinates and access to other device
Updated: 2012-12-22 00:48:17

Menu Skip to content Tag Archives : excessive permissions Post navigation Mobile Application Security Flaw : Excessive Permissions and Privileges Posted on December 21, 2012 by Sameer Dixit by Sameer Dixit Excessive permissions and privileges is one of the most common and serious vulnerability that is creating great deal of privacy concerns among smart phone . users Applications with more access are often the target for attackers because of its broad attack surface . Most of the mobile applications residing on the mobile devices have more than required access permissions and privileges on the device . Such as , access to userâ s contact list and update rights without notifying user , Receiving sending SMS messages , Location recording userâ s GPS coordinates and access to other device
Updated: 2012-12-22 00:48:15

: Menu Skip to content Post navigation Mobile Application Security Flaw : Input Validation Mobile Application Security Flaw : Excessive Permissions and Privileges Posted on December 21, 2012 by Sameer Dixit Excessive permissions and privileges is one of the most common and serious vulnerability that is creating great deal of privacy concerns among smart phone . users Applications with more access are often the target for attackers because of its broad attack surface . Most of the mobile applications residing on the mobile devices have more than required access permissions and privileges on the device . Such as , access to userâ s contact list and update rights without notifying user , Receiving sending SMS messages , Location recording userâ s GPS coordinates and access to other device
Updated: 2012-12-21 08:31:30
liblfds is a portable, lock-free data structure library. It supports Windows (user-mode and kernel-mode) and Linux (user-mode) on x86, x64, and ARM, under a variety of toolchains. Currently, the library contains a freelist, queue, ringbuffer, singly linked list (logical delete only), and a stack. The home page contains a blog, bugzilla, forum, and wiki. The wiki contains comprehensive documentation for development, building, testing, and porting. There is no license. You are free to use this code in any way.Release Notes: This is a long overdue maintenance release. It fixes all bugs, but has almost no new or improved functionality.
Tags: lock-free, C, Library
Licenses: Public Domain
Updated: 2012-12-21 08:31:28
Login Signup Lost password Home Articles Browse Projects by Tag Submit new Project About Blog Help Sites All Mac OS X Mobile Unix Projects JasperStarter JasperStarter JasperStarter is a commandline launcher for JasperReports . It can run any JasperReport which needs a jdbc datasource or empty datasource , use any database for which a jdbc driver is available , execute reports which need runtime parameters , print directly to the system default or a given printer , optionally show a printer dialog to choose a printer , optionally Show printpreview , export to file in the pdf , rtf , docx , odt , and html formats , export multiple formats in one commanding call , print and export in one commanding call , and integrate in non-Java applications for example PHP , Python A binary executable is
Updated: 2012-12-18 17:27:55
JFile builds on JActor and Jid, adding file persistence and an in-memory database which has a throughput of one million transactions per second when running on an i7 with SSD.
A new LA32Block class was added.
Tags: Persistence, transactions, log, Database
Licenses: LGPL
Updated: 2012-12-16 23:34:58
Sendmail Analyzer is a tool to monitor sendmail usage and generate HTML and graph reports. It reports all you ever wanted to know about email trafic on your network. You can also use it in an ISP environment with per domain and per mailbox reports. Statistics are generated per hour, day, month, and year.Release Notes: This release improves support for Postfix with Dovecot and Spamd. There are also several bugfixes.
Tags: Internet, Log Analysis
Licenses: GPLv3
Updated: 2012-12-14 22:19:53
O2OO reads sensor data from a car into a sqlite database and generates graphs of the data so you can analyze the behavior of the car. It can also retrieve the location from a GPS module and store it in the same database, then can create a Google Maps KML-file, coloring the route line with a color depending on a sensor reading.
Release Notes: Several PDF and spreadsheet output fixes (e.g. all data in one sheet for more easily combining them).
Tags: data logger, car diagnostics, OBD2, GPS, kml
Licenses: GPLv2 with extension
Updated: 2012-12-12 01:15:32
It’s our last show for the year, folks. We’re taking about a month off, and we’ll be returning in 2013 for Episode 300! Happy Holidays from Network Security Podcast! No Rich this week, but Martin and Zach make up for the lack somehow. Maybe experience has taught them something. Network Security Podcast, Episode 299, December [...]
Updated: 2012-12-07 10:27:32
French Word Searches is designed for beginner to intermediate learners of French, such as those preparing for the UK GCSE French exam.
It allows the user to play word searches based on 1,200 items of essential French vocabulary. Word searches may be tailored to the user's desired combination of topics.Release Notes: Four sizes of word search are now available. The target number of words per grid and the "criss-crossiness" (tendency for words to cross over) can also be set.
Licenses: Freeware
Updated: 2012-12-06 04:12:51
Login Signup Lost password Home Articles Browse Projects by Tag Submit new Project About Blog Help Sites All Mac OS X Mobile Unix Projects web2ldap web2ldap web2ldap is a full-featured Web-based LDAPv3 client written in Python . It is designed to run either as with stand-alone built-in Web server or under the control of another Web server with FastCGI support e.g . Apache with mod_fastcgi It has support for various LDAPv3 bind methods and a powerful built-in schema browser . HTML templates are supported for displaying and editing entries , and LDIF templates can be used for quickly adding new entries . A built-in X.509 parser displays a detailed view of certificates and CRLs with active . links Tags Networking LDAP Internet Web Systems Administration Database Front-Ends Licenses GPL