Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Download Now
Build Securely on AWS with Proven Frameworks
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Anonymous proxy server. Supports http, https, socks. Can be used as a normal proxy or as a p2p anonymous proxy. Web based drag and drop access configuration. Works with windows, linux. IE, firefox, etc. Visit http://anonproxyserver.sf.net/ for more info.
A windows server control panel for web hosting companies
PrimeWeb is a web-based hosting management system designed to run on Windows servers, providing an intuitive interface for managing websites, domains, databases, emails, virtual machines and server resources.
Built with performance and security in mind, it allows administrators and users to efficiently deploy and maintain web hosting environments with minimal technical effort.
SWeTE is an HTTP reverse proxy that provides website translation. You can set up proxies for any sites, then connect a translation memory to the site to have it translated into any language. It provides a web-based translation form, and an option to translate strings using Google's translation API.
PHP Daemon & Frontend for Squid Web Proxy Server.
Provides both User Based bandwidth Monitoring, and Squid Logfile Analysys. Allows users to generate graphs of traffic usage, based on many different factors.