(Page 3 of 9)   < Prev  1 2 3 4 5 6 7 8  Next >

Category: Utilities » Usage Monitoring

Event Log Explorer
Added 2005-10-09
by FSPro Labs
Event Log Explorer is a free software for viewing, monitoring and analyzing events recorded in Security, System, Application and another logs of Microsoft Windows NT/2000/XP/2003 operating systems. It extends starndard Event Viewer monitoring functionality and brings new features.

MonitorMagic - Server & Network Monitor
Added 2004-08-09
by Tools4ever
MonitorMagic is a proactive server and network monitoring and reporting tool for Windows 2003/XP/2000/NT servers, workstations and SNMP devices and supports agentless monitoring. MonitorMagic supports Windows and UNIX based resources such as memory, disk and CPU load and optionally records the values into a database to enable graphical trending and reporting. MonitorMagic ships with predefined policies for popular hardware and applications.

Added 2004-07-22
by SurveilleTech Software
e-Surveiller is a powerful user-activity monitoring, logging and real-time surveillance software package. With it, you can monitor the activities of several computer users on standalone computers, on a local area network and on remote computers across the Internet. You view the screens of monitored users on a LAN or across the Internet in real-time! and it empowers you to save screen snapshots at any time. It stealthily records all keystrokes, web site visits, AOL, AIM,

Added 2004-03-22
by blackrax
GILoT is an interpreting and formatting log tail:er. As it tails a log file, each log entry is matched against rules dictated in the easily customized rules file; if the log is matched, the log message is formatted to output only the requested data. As such, only relevant data is parsed and reading the log entries becomes much easier.

Added 2004-03-09
by Gary Wallis
mysqlRadiusd is a RADIUS daemon based on the 1.6.6 Cistron distribution and the mySQL patches that has been modified for use with the mysqlISP GPL ISP management software system. It is very stable and can handle large ISPs easily while pumping mass accounting records into mysqlRadacct subsystem at a tremendous rate from even multi-server clusters.

A Joint Monitoring System (AJMS)
Added 2004-03-04
by Andrew Gray
AJMS (AKA "AMS") displays syslog messages in realtime via a browser or standalone Java client. It also supports searches of any SQL database. It offers straightforward configuration and integrates easily into any existing syslog environment.

Added 2004-03-01
by Gerrit Pape
socklog cooperates with the daemontools package to create a small and secure replacement for syslogd. socklog supports system logging through Unix domain sockets (/dev/log) and UDP sockets ( with the help of daemontools svscan, supervise, and multilog. socklog provides a different network logging concept, and also does log event notification. multilog has built in log file rotation based on file size, so there is no need for any cron jobs to rotate the logs. socklog is small, secure, and reliable.

GKrellM xkb
Added 2004-01-06
by Tomas Styblo
GKrellM xkb is a plugin for GKrellM which displays a small country flag indicating the currently-active national keyboard layout. It requires GKrellM2 and the XKB X Window extension.

Process Change Detection System
Added 2003-12-29
by Bart Somers
Process Change Detection System is a script to monitor changes in processes--not to monitor if your Web server is still running, but to see if there are new programs running. When debugging a honeypot logging, you often see that there's an extra inetd running, to open up a backdoor port. Or, less dramatically, people login to a system and "forget" to logout.

Added 2003-11-24
by R. Bernstein
ps-watcher periodically a gets a list of process names via ps. A configuration file specifies a list of Perl regular-expression patterns to match the processes against. For each match, a Perl expression specified for that pattern is evaluated. The evaluated expression can refer to variables which are set by ps and pertain to the matched process(es), including the amount memory consumed by the process, or the total elapsed time. If the Perl expression for a matched pattern evaluates true, then an action can be run such as killing the program, restarting it, or mailing an alert.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus