Network security is no longer an insurance policy protecting from a highly unlikely event. Security breaches are the new norm. Having a suite of network security appliances is vital to protect IT assets and keep the business up and running. In our brief 5 min Tech Short see how Security Tool Chaining let’s you optimize and filter data before it enters your security appliance, get the right traffic to each system, and ensure network performance without sacrificing network protection. The solution is simple, it's elegant and it is here today.Sponsored Listing
- Grouping and Descriptive Categories (5)
- Linux (5)
- Other Operating Systems (5)
- BSD (4)
- Mac (4)
- Modern (4)
- Windows (3)
- Audio & Video
- Business & Enterprise
- Home & Education
- Science & Engineering
- Security & Utilities
- System Administration
FDNS measures, detects, and notices the extremely anomalous traffic according to the bulk distribution aspect of flooding traffic, including: packet flooding attack, portscan, spam distribution.3 weekly downloads
Luz is a GPL IRC Services. It's purpose is to offer a quality free software product, instead of the closed source available ones. It's designed mainly -but not limited to- for ircu based ircd's.
Quick site is an Open Source Web Site Conntent Manegment System. It allows you to manage Content on you Site as well as the look of your site. It also provides you with a message board and an easy way to manage it.
This package is useful for tracking software licenses and installations for businesses of any size. Information such as the license key, media location, purchase order number, and installation details are all tracked by the database. The package uses PHP
This project contains myriad tools for running successful political campaigns. While designed in the US, it should be easily portable to other nations as well, assuming a basic knowledge of the target locale's regulations and infrastructure.