Cortexit: Text Dispersant for Chrome, HTML5/Javascript, Node.JS, or PHP
Multimedia reading assistance tool for speed, comprehension, and accessibility for those with vision and cognitive impairments.
A Linux IPv4 iptables firewall and traffic shaper. It allows flexible rule creation, while also shipping with presets for common needs. Rules are written in simple XML, allowing various ways to group and nest the arguments. An interactive mode is available in order to build configuration files in a
... [More] wizard based manner. Extensive documentation is also included. [Less]
Serf is a decentralized solution for cluster membership, failure detection, and orchestration. Lightweight and highly available.
Serf relies on an efficient and lightweight gossip protocol to communicate with nodes. The Serf agents periodically exchange messages with each other in much the same
... [More] way that a zombie apocalypse would occur: it starts with one zombie but soon infects everyone. In practice, the gossip is very fast and extremely efficient. [Less]
A java-based declarative, multi-threaded and incremental build system that provides a fluent java API for writing build programs. Can use ant tasks and ant and shell scripts as backend.
This program is great for analyzing your My Finds Pocket Query files from Geocaching.com. You can also use the program to create a printable web page of the caches in a certain area, to be carried with you as a reference. You can drag and drop those caches into different order, and you can hide the
... [More] data that you don't need. In addition to the file about individual caches a couple of statistics files are generated: one about the owners of the caches and another about the countries of the caches. This will allow you to track your progress on various challenges. [Less]
Automated CVE Checking Tool
cve-check-tool, as its name suggests, is a tool for checking known (public) CVEs. The tool will identify potentially vunlnerable software packages within Linux distributions through version matching. Where possible it will also seek to determine (through a distribution
... [More] implemention) if a vulnerability has been addressed by way of a patch. [Less]
This site uses cookies to give you the best possible experience.
By using the site, you consent to our use of cookies.
For more information, please see our
Privacy Policy