Showing 2 open source projects for "ssh key"

View related business solutions
  • Achieve perfect load balancing with a flexible Open Source Load Balancer Icon
    Achieve perfect load balancing with a flexible Open Source Load Balancer

    Take advantage of Open Source Load Balancer to elevate your business security and IT infrastructure with a custom ADC Solution.

    Boost application security and continuity with SKUDONET ADC, our Open Source Load Balancer, that maximizes IT infrastructure flexibility. Additionally, save up to $470 K per incident with AI and SKUDONET solutions, further enhancing your organization’s risk management and cost-efficiency strategies.
  • Top-Rated Free CRM Software Icon
    Top-Rated Free CRM Software

    216,000+ customers in over 135 countries grow their businesses with HubSpot

    HubSpot is an AI-powered customer platform with all the software, integrations, and resources you need to connect your marketing, sales, and customer service. HubSpot's connected platform enables you to grow your business faster by focusing on what matters most: your customers.
  • 1
    Multi PuTTY Manager Secure

    Multi PuTTY Manager Secure

    putty session manager

    Its modified copy of original MPManager https://sourceforge.net/projects/multiputtymanager/ I just added same features (password, enscription) witch I needed, hope it will be usefull to anybody else. Added autologon with ssh public key.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 2
    IT-Remote Service Tools

    IT-Remote Service Tools

    Manage Remote Connections, RDP, SSH, Mikrotik, VNC

    Manage remote connections for Remote Desktop "RDP" , VNC Viewers, PuTTY , and Mikrotik. Easy to manage connections places, you can add , edit and delete connection place by just one click. IT-Remote Service Tools is secured with password with possibly to turn ON or OFF feature. Configurations file are Extensible Markup Language XML. Password are encypted with symmetric-key encryption that means the string can only be decrypted if the other party has the correct key (which is used...
    Downloads: 3 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next