Though it seems like ransomware is old news in 2017, stats show that we still have no idea how to defend ourselves against it: 70% of companies targeted by ransomware get infected. Learn the various ways ransomware can be delivered to computers, the steps it takes to encrypt your files, and best practices you should apply immediately to minimize the damage.Are you an IT pro at a company with 150+ employees?Advertisement
- OSI-Approved Open Source (8)
- Public Domain (1)
- Grouping and Descriptive Categories (7)
- Windows (6)
- Linux (5)
- Modern (5)
- Mac (4)
- BSD (2)
- Audio & Video
- Business & Enterprise
- Home & Education
- Science & Engineering
- Security & Utilities
- System Administration
Portable software for USB, portable, and cloud drives887,416 weekly downloads
A powerful, cross platform, SQL database system21,671 weekly downloads
Panic Button provides an icon in the Windows system tray. By clicking on this icon, a user may send a screen grab and a report form to a help desk or similar. This should make it easier for users to provide useful error/problem reports to support staffs.2 weekly downloads
This project automates Http-requests i.e. all browser activities can be logged/written to XML-formated files and redone by using simple methods. This is very useful for automating http-server-requests e.g. queries to search engines, external databases..1 weekly downloads
Onjab - sync your bookmarks between browsers and computers. Basically protocol, and client/server examples.
Reentry Evolution Architecture The idea is to develop a toolset- and serverinfrastructure on top of common object runtime environments (J2EE,.NET and/or other) that supports evolutionary model driven and language oriented development for SOA and REST.
This project is an customised, highly evolved open source L2J server emulation software. Main source bases mostly on L2JOfficial project files. Project is written in Java, Python, XML, HTML, SQL and so on. //// and is not available to all anymore. ho
dScanner is a distributed network security scanner. It is based on the work of Nessus and allows scanner nodes to identify vulnerabilities on a subnet. The scanner nodes report to a central management server.
Object storage is clearly the simplest, most flexible, and most scalable way to store tons of unstructured content. Scality’s Zenko.io enables developers and businesses to take advantage of this simplicity, for free. Whether you're programming in Go or Java, or whether you're using existing applications for personal or shared data management, Scality’s Zenko.io is a great starting point.Advertisement