Anomaly
Anomaly Wiki is a content management system (CMS) with the following goals: - Few requirements, all you need is a web server running PHP 4.3.0 or later. - Based on plugins and templates. - Fast and minimalistic. Every millisecond counts. Features: - Completely new intuitive authorization...
Platforms: Windows, Mac, *nix, PHP, BSD Solaris
License: Freeware | Download (54): Anomaly Wiki Download |
Anomaly Wiki is a content management system (CMS) with the following goals:- Few requirements, all you need is a web server running PHP 4.3.0 or later.- Based on plugins and templates.- Fast and minimalistic. Every millisecond counts.Features:- Completely new intuitive authorization system.-...
Platforms: PHP
License: Freeware | Size: 153.6 KB | Download (49): Anomaly Wiki Script Download |
Given mean anomaly and eccentricity of an orbit, eccentric anomaly can be calculated using Kepler's Equation. However, the equation is nonlinear, and an iterative technique must be used. This program uses a fixed-point iterative technique to output eccentric anomaly to a user defined tolerance,...
Platforms: Matlab
License: Freeware | Size: 10 KB | Download (56): Solve Kepler's Equation for E Download |
Since the eccentric anomaly cannot be directly calculated from certain given values, this function performs a simple Newton-Raphson iteration to solve for the eccentric anomaly within a given tolerance (default 10^-8 radians)
Platforms: Matlab
License: Freeware | Size: 10 KB | Download (43): CalcE.m Download |
Fourthly the anomaly is a game Entirely free which is halfway between the game and play by mail in real time. There is no notion of round and you play your own pace while keeping the same chances of gagner.Vous
Platforms: PHP
License: Freeware | Size: 235.52 KB | Download (44): Anomalie4 Download |
Devialog is a behavior/anomaly-based syslog intrusion detection system which detectsattacks via anomalies in syslog. Present log-based IDS: Nearly all present log-based intrusion detection systems operate using a pre-defined known signature base, usually painstakingly created by hand. They can...
Platforms: *nix
License: Freeware | Size: 20.48 KB | Download (43): checkps Download |
Devialog is a behavior/anomaly-based syslog intrusion detection system which detectsattacks via anomalies in syslog. Present log-based IDS: Nearly all present log-based intrusion detection systems operate using a pre-defined known signature base, usually painstakingly created by hand. They...
Platforms: *nix
License: Freeware | Size: 22.53 KB | Download (94): check-ps Download |
WifiScanner is a tool that has been designed to discover wireless node (i.e access point and wireless clients). It is distributed under the GPL License. It work with CISCO?*A* card and prism card with hostap driver or wlan-ng driver, prism54g, Hermes/Orinoco, Atheros, Centrino, ... An IDS system...
Platforms: *nix
License: Freeware | Size: 870.4 KB | Download (119): WiFiScanner Download |
1. we have a signal which we'll monitor 2. we produce lymphocytes - length lyphocyte as a signal, we take random numbers3. NSA... we check that lymphocyte is different from signal, if not we random another4. now we monitor signal, if any value of signal is the same or nearest to lyphocyte - we...
Platforms: Matlab
License: Freeware | Size: 10 KB | Download (40): NSA - Negative Selection Algorythm Download |
YASeMI (Yet Another Security Monitoring Interface) consists of a Web interface that can be of aid to SysAdmins and Security Admins, in detecting possible anomaly or intrusion behaviour in their network, based on Netflow data their routers emit.
Platforms: PHP
License: Freeware | Size: 163.84 KB | Download (41): YASeMI Download |
Ourmon is a statistically oriented open-source network monitoring and anomaly detection system. It may also be viewed as a flow collection system. Ourmon is based on promiscuous mode packet collection on Ethernet interfaces and typically uses port mirroring via an Ethernet switch. A probe...
Platforms: *nix
License: Freeware | Size: 522.24 KB | Download (36): ourmon Download |
Privacyware Dynamic Security Agent (DSA) delivers easy, immediate, signature-less protection from known or new malware and all forms of unauthorized use for Windows desktops and servers. An intelligent multi-layered defense, DSA continuously evaluates system processes, applications, WinAPI calls,...
Platforms: Windows
License: Freeware | Size: 1.54 MB | Download (509): Dynamic Security Agent Download |
OSSIM aims to unify network monitoring, security, correlation, and qualification in one single tool. The project combines Snort, BASE, NTOP, Nagios, nmap, nessus, and rrdtool to provide the user with full control over every aspect of networking or security..
Platforms: *nix
License: Freeware | Download (180): OSSIM Download |
Ossim stands for Open Source Security Information Management. OS-SIMs goal is to provide a comprehensive compilation of tools which, when working together, grant a network/security administrator with detailed view over each and every aspect of his networks/hosts/physical access...
Platforms: *nix
License: Freeware | Size: 3.8 MB | Download (104): OS-SIM 0.9.9 Download |
Joeq is a virtual machine and compiler infrastructure designed to facilitate research in virtual machine technologies such as Just-In-Time and Ahead-Of-Time compilation, advanced garbage collection techniques, distributed computation, sophisticated scheduling algorithms, and advanced run time...
Platforms: *nix
License: Freeware | Size: 1024 KB | Download (98): joeq virtual machine Download |
Socket::PassAccessRights is a Perl extension for BSD style file descriptor passing via Unix domain sockets. SYNOPSIS use Socket::PassAccessRights; Socket::PassAccessRights::sendfd(fileno(SOCKET), fileno(SEND_ME)) or die; $fd = Socket::PassAccessRights::recvfd(fileno(SOCKET)) or die; open...
Platforms: *nix
License: Freeware | Size: 7.17 KB | Download (91): Socket::PassAccessRights Download |
You are the pilot of Quantum, an Omega-class fighter patroling deep space. Its a lonely assigment. Suddenly, and predictably, you are caught in a sub-space anomaly and transported to the middle of a mysterious region of space with a black hole at its center and deadly asteroids drifting by. Youll...
Platforms: Mac
License: Freeware | Size: 6 MB | Download (478): Quantum for Mac OS Download |
When you are looking for an easy recovery MySQL solution then look no further than Recovery MySQL Free, the leading error detection and file recovery solution only available from our secure download site. Recovery MySQL Free is a simple to use tool which is fully automated from installation...
Platforms: Windows
License: Freeware | Size: 1.87 MB | Download (60): Recovery MySql Free Download |
Open OST Free is the market leading utility for managing, opening and recovering damaged .ost files used in Microsoft Outlook. With Open OST Free you will know how to open Outlook ost file 2003 encrypted without any issues so you can recover emails which are password protected (very handy if you...
Platforms: Windows
License: Freeware | Size: 1.86 MB | Download (624): Open OST Free Download |
Repair DBX Files Tool is the market leading tool for how to repair Outlook dbx files and get your emails and information back fast! Repair DBX Files Tool is powered by our cutting edge error detection algorithm combined with our comprehensive error database to which no-one else has access except...
Platforms: Windows
License: Freeware | Size: 1.1 MB | Download (659): Repair DBX Files Tool Download |