CeBIT Open Source Project Lounge - GOsa²
GOsa² -- Central Software and Ressource ManagementBy
GOsa² is among the 15 projects that will present their work at CeBIT, offering a central management of software. Although not known to many, they help out in large projects already, for example in the LiMux project in the City of Munich, Germany.
In a nutshell: How would you describe your project in one or two sentences?
GOsa² is a highly capable, flexible and free solution for central management of all connected resources and users of an LDAP-based authority or enterprise network. GOsa² provides newcomers and seasoned system administrators alike with an intuitive, role-based administrative interface for efficient management and deployment of complex IT environments.
When did the project begin?
The project has been around since the end of 2001.
How many active members does the project have?
The team consists of four core developers and 11 project members with write privileges to the development repository.
How did the project come into being?
GOsa² has its roots in GONICUS GmbH. It was developed to give customers an easy infrastructure management capability and was developed right from the start as Open Source.
Why should a CeBIT visitor come to your booth?
Meet GOsa² and its developers physically at CeBIT, and we'd be happy to answer all questions!
Who do you make your software for?
GOsa² solicits input from the community and customers, whose suggestions get continuing attention and become part of the software.
Where do you see your biggest current challenge?
We are still trying to develop a logo.
Under which license is the software currently offered?
GOsa² is under GPL licensing.
Project website: www.gosa-project.org
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm