Secure Cloud Storage for Files, Photos and Documents | pCloud
Store, access, and manage your files on your own terms, from anywhere.
Store, sync, and share your files securely with pCloud. Get up to 10 GB of free secure cloud storage and access your files from any device, anywhere.
Learn More
DialedIn: Cloud Contact Center Software
Cloud Based Contact Center Software that Drives Success
DialedIn is a modern call center software designed to transform customer interactions and streamline your operations, helping teams achieve more daily. By automating and optimizing key workflows across inbound, outbound, and blended environments, DialedIn helps you boost agent productivity and deliver better outcomes across every call.
Module to allow for reading lines from a continuously-growing file (such as a system log). Handles log files that get rotated/trucated out from under us. Inspired by the Perl File::Tail module.
A web-based human event (links/books read, songs played, etc.) logging tool focused on rich bibliographic support and library (as in books-on-shelves) systems integration.
Loganalyzer for Windows XP Firewall and Linux Iptables firewall. Generates a nice html document with statistics from all the pakets captured by the firewall. The program is written in Python and has an (optional) graphical interface.
pt_BR: Um programa que le o conteúdo do log do sistema e gera um arquivo "RSS".
us: A program that reads the content of the system log and will generate a "RSS".
This project is an approach to automating the testing of performance properties of complex systems.Just like functional specs for software we aim to develop an executable language for asserting performance expectations of a program.This implements Sharon
PyEximon is a GNOME monitor/manager for the popular MTA, Exim. It includes real-time status graphs and log updates, colored log browsing, hierarchial message lists, as well as a graphical interface to common message functions.
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
This is a program that watches your system log files, looking for hack attempts. It instanty reacts to potential security breaches by (for instance) adding firewall rules to cut off the attacker.
The Secure Remote Log Monitor (SRLM) project provides client and server
utilities that collect application or system log files from multiple systems over an untrusted network onto a central server for analysis and action.
This project is a Python-based HTTP web proxy server that hooks into MySQL to store a full history of your browsing. Allows you to check out statistics about your browsing habits. Creates a personal portal page, has search features, multi-user, filters.
Multi-threaded host name and technical contact lookup tool.
Reads a list of counted IP addresses (as outputted by uniq -c) from stdin or a file. Resolves their hostnames and (whois) technical contacts. Writes info to stdout.
Find out where your website visitors are from: generates statistics on hits per top level domain (e.g. .com, .org, .uk, .se, .fr). Currently works with apache log format, but can easily be extended to understand other formats. Written in vanilla Python.
Shadow Watcher is a Peer to Peer log sharing tool for the security analyst. Consider it a "community watch" program which allows you to keep your system secure from the threats on the internet and help others do the same.
This is a collection of REST specifications, and implementations of those specs, for very low-level information sharing and workflow operations using REST actions over HTTP.
Implementations are in various languages, mainly Java, Python, and Ruby.
This is my Master Degree project, I am trying to improve the movie prediction by using machine learning techniques, for the Netflix data set. This project is done under guidance of Dr. Richard Maclin, at University of Minnesota Duluth.
A python based adaptive network analyzer. The aim of the project is to identify illegitimate uses of bandwidth in a network. Uses tshark for network data gathering.
This is a Firewall and IDS front-end, the main purpose is simplify configuration of Iptables and Fwsnort and Psad management. The Firewall provides an experimental feature to decide in real-time about each outgoing connection.