4 programs for "internet traffic" with 2 filters applied:

  • Find out just how much your login box can do for your customer | Auth0 Icon
    Find out just how much your login box can do for your customer | Auth0

    With over 53 social login options, you can fast-track the signup and login experience for users.

    From improving customer experience through seamless sign-on to making MFA as easy as a click of a button – your login box must find the right balance between user convenience, privacy and security.
  • Achieve perfect load balancing with a flexible Open Source Load Balancer Icon
    Achieve perfect load balancing with a flexible Open Source Load Balancer

    Take advantage of Open Source Load Balancer to elevate your business security and IT infrastructure with a custom ADC Solution.

    Boost application security and continuity with SKUDONET ADC, our Open Source Load Balancer, that maximizes IT infrastructure flexibility. Additionally, save up to $470 K per incident with AI and SKUDONET solutions, further enhancing your organization’s risk management and cost-efficiency strategies.
  • 1
    VTun is the easiest way to create Virtual Tunnels over TCP/IP networks with traffic shaping, compression, and encryption. It supports IP, Ethernet, PPP and other tunnel types. VTun is easily and highly configurable. VPN, Mobile IP, Shaping, etc
    Leader badge
    Downloads: 5,331 This Week
    Last Update:
    See Project
  • 2

    MRelay

    Host to Host Network Acceleration and Encryption

    MRelay splits and distributes the traffic of a single TCP connection to several connections and merges the data at the other end. Using this approach, it is possible to achieve high throughput between two points on the network regardless of the delay between two points. MRelay can optionally encrypt the data and exchange some http headers before the relay process to make the traffic look like a regular http file download. This can be used to overcome the highly restrictive firewalls...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    Anon on the Go

    portable anonymity pack

    contents: 1.bleachbit portable cleans cache data and browsing data and useless logs 2.proxifier 3.15 portable used to set rules for routing ALL traffic through a proxyy for tor set to 127.0.0.1 port :9050 in rules 3.true crypt portable encrypt your harddrive 4.u torrent portable 5.thunderbird portable email cliet which is tor freindly 6.putty ssh client 7.tor browser 8. xchat portable 9.pidgin portable secure IM client tor and off the record messaging freindly 10. torchat 11. K-mac...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    The purpose of this project is creating a plugin for <a href="http://www.ethereal.com/">Ethereal</a> that will enable it to decode ITU-T Recommendation H.323 traffic. The implementation is based on <a href="http://www.openh323.org">OpenH323</a> code
    Downloads: 1 This Week
    Last Update:
    See Project
  • Cyber Risk Assessment and Management Platform Icon
    Cyber Risk Assessment and Management Platform

    ConnectWise Identify is a powerful cybersecurity risk assessment platform offering strategic cybersecurity assessments and recommendations.

    When it comes to cybersecurity, what your clients don’t know can really hurt them. And believe it or not, keep them safe starts with asking questions. With ConnectWise Identify Assessment, get access to risk assessment backed by the NIST Cybersecurity Framework to uncover risks across your client’s entire business, not just their networks. With a clearly defined, easy-to-read risk report in hand, you can start having meaningful security conversations that can get you on the path of keeping your clients protected from every angle. Choose from two assessment levels to cover every client’s need, from the Essentials to cover the basics to our Comprehensive Assessment to dive deeper to uncover additional risks. Our intuitive heat map shows you your client’s overall risk level and priority to address risks based on probability and financial impact. Each report includes remediation recommendations to help you create a revenue-generating action plan.
  • Previous
  • You're on page 1
  • Next