Showing 4 open source projects for "ip"

View related business solutions
  • End-To-End Document Management Software Icon
    End-To-End Document Management Software

    UnForm is ideal for businesses focusing on distribution, manufacturing ERP solutions, and general accounting.

    UnForm® is a platform-independent software product that creates, delivers, stores and retrieves graphically enhanced documents from ERP application printing. A complete, end-to-end document management solution, UnForm interfaces at the point of printing to produce documents in various formats for printing and electronic delivery.
    Learn More
  • The most advanced C and C++ source code analyzer Icon
    The most advanced C and C++ source code analyzer

    Combining the benefits of static and dynamic source code analysis to deliver the most advanced & exhaustive code verification tool.

    TrustInSoft Analyzer is a C and C++ source code analyzer powered by formal methods, mathematical & logical reasonings that allow for exhaustive analysis of source code. This analysis can be run without false positives or false negatives, so that every real bug in the code is found. Developers receive several benefits: a user-friendly graphical interface that directs developers to the root cause of bugs, and instant utility to expand the coverage of their existing tests. Unlike traditional source code analysis tools, TrustInSoft’s solution is not only the most comprehensive approach on the market but is also progressive, instantly deployable by developers, even if they lack experience with formal methods, from exhaustive analysis up to a functional proof that the software developed meets specifications.
    Learn More
  • 1
    SSPanel-UIM

    SSPanel-UIM

    Multi-purpose proxy service management system

    ...It supports multi-tenant accounts, traffic quotas, node management, coupon systems, invite codes, and payment gateways integration (for example, Stripe, PayPal, etc.). The platform includes features like user dashboards, usage graphs, IP/device logging, and automatic coupon or traffic renewal logic. Administrators can configure SSR/V2Ray or other proxy backends and synchronize them with the panel, so nodes apply updates or bans uniformly. Because anonymity and reliability matter, SSPanel-UIM includes abuse checks like detection of reused accounts or suspicious traffic patterns. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    Laravel Trusted Proxies

    Laravel Trusted Proxies

    Laravel Proxy Package for handling sessions when behind load balancers

    ...This is useful if your web servers sit behind a load balancer (Nginx, HAProxy, Envoy, ELB/ALB, etc), HTTP cache (CloudFlare, Squid, Varnish, etc), or other intermediary (reverse) proxy. Laravel (technically the Symfony HTTP base classes) have a concept of a "trusted proxy", where those X-Forwarded headers will only be used if the source IP address of the request is known. In other words, it only trusts those headers if the proxy is trusted.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    IPaccount

    Access management tool for Squid proxy server

    IPaccount is web tool for internet resources access management of the Squid proxy server. It supports setting up of traffic shapers, ip address reservations for hosts of LAN within DHCP server. The statistics of logons in Active Directory domain is added for the new version.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Scripts written in php/mysql/bash aimed to provide control over volume of traffic downloaded with users through squid proxy server. Users are identified with ip addresses or computers names. Current version of squid-traffic contains an installer that sim
    Downloads: 0 This Week
    Last Update:
    See Project
  • Secure Computing Platform Icon
    Secure Computing Platform

    Streaming isolated remote applications and desktops to the browser

    Building effective anti-phishing, anti-malware and ransomware defenses has never been easier. Kasm’s isolation technology insulates users by creating a "chasm" between the user's personal computer and web-borne threats.
    Try it Now
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB