Easily access more than 100,000 products and tools with our robust search engine. Manage your entire IT lifecycle from purchase to renewal all in one place — so you can get more done faster.Sponsored Listing
- Other Operating Systems (10)
- BSD (9)
- Grouping and Descriptive Categories (8)
- Linux (8)
- Modern (6)
- Windows (6)
- Mac (4)
- Audio & Video
- Business & Enterprise
- Home & Education
- Science & Engineering
- Security & Utilities
- System Administration
Weak signal ham radio communication682 weekly downloads
yaSSL, or yet another SSL, is an embedded ssl library for programmers building security functionality into their applications and devices. yaSSL is highly portable, and runs on standard as well as embedded platforms(QNX, ThreadX, VxWorks, Tron) yaSSL is still available but no longer being developed. Current development on the same project continues under wolfSSL. Visit yaSSL Home above for the latest stable release.1 weekly downloads
Confiture is the new generation of the cryptographic software, Confiture use the all new innovation cryptographic.1 weekly downloads
The Scality RING is software that turns any standard x86 servers into web-scale storage. With the RING, you can store any amount of data, of any type, with incredible efficiency and 100% reliability, guaranteed—all while reducing costs by as much as 90% over legacy systems.Sponsored Listing
An open-source Unmanned Aerial Vehicle
Luz is a GPL IRC Services. It's purpose is to offer a quality free software product, instead of the closed source available ones. It's designed mainly -but not limited to- for ircu based ircd's.
It's trying to do something again, but better
This is a unix distribution I made so that I can develop from anywhere--a virtual desk if you will. Some of my friends and colleagues have found it useful, and an easily accessible place to put the operating system up is on the internet.
A portable emulator, mainly oriented on the GameBoy by Nintendo but in the future maybe also other Z80-based systems. Written in C++ and with SDL.
The book shows you how architecting a modern security visibility infrastructure can help your business adapt to new threats, lengthen the usefulness of your current security investments, and optimize uptime and availability. See the entire threat landscape, understand security visibility basics, support both inline and out-of-band security systems, explore security visibility use cases and ask the right questions about visibility.Sponsored Listing
The main intention of this project is to support the SNNS (Stuttgart Neural Net Simulator) with patches, bugfixes, tools and add on developments. Second target is to publish useful links and information about the SNNS.
A benchmark suite for reliable testing of IP networks.