Search Results for "distributed shared memory"
Sort By:
Count and limit requests by key with atomic increments
A File Encryptor with many Options and Powerful Algorithms!
Tool that embeds identifiers in files to trace leak sources
A program that detects and blocks phishing, pharming, Hacker's C&C.