Easily access more than 100,000 products and tools with our robust search engine. Manage your entire IT lifecycle from purchase to renewal all in one place — so you can get more done faster.Sponsored Listing
- BSD (4)
- Other Operating Systems (4)
- Grouping and Descriptive Categories (3)
- Linux (3)
- Mac (2)
- Windows (2)
- Android (1)
- Embedded Operating Systems (1)
- Emulation and API Compatibility (1)
- Audio & Video
- Business & Enterprise
- Home & Education
- Science & Engineering
- Security & Utilities
- System Administration
"JacKBot" is an IRC bot which can be amplified with modules.
PP3 creates celestial charts. It generates resolution independent sky maps of very high graphical quality. They can be used for example as illustrations in books or on web pages. Databases are included but you may use own data if you wish.
The book shows you how architecting a modern security visibility infrastructure can help your business adapt to new threats, lengthen the usefulness of your current security investments, and optimize uptime and availability. See the entire threat landscape, understand security visibility basics, support both inline and out-of-band security systems, explore security visibility use cases and ask the right questions about visibility.Sponsored Listing
sechk - SEcurity CHecKer It is a powerful and useful tool to check if you got exploited and rooted, it will use checksum comparation via md5 sum, it exchanges file lists and csums from the sechk server. It\'s gonna work with all posixes and unixes.