Operating System Kernels Software

OS OS

  • More...

Category Category

License License

Translations Translations

  • More...

Programming Language Programming Language

Status Status

Audience Audience

User Interface User Interface

Operating System Kernels Software

  • WhatsUp® Gold - Ranked #1 For Network Monitoring WhatsUp® Gold - Ranked #1 For Network Monitoring Icon
    WhatsUp® Gold - Ranked #1 For Network Monitoring Icon

    Automatically discover anything connected to your network with the industry's best flexible licensing. Free trial of our award-winning software

    The industry’s best network monitoring software, WhatsUp® Gold includes: Hybrid Cloud Monitoring, Real-Time Performance Monitoring, Automatic and Manual Failover and Extended Visibility to Distributed Networks. Trusted by thousands of organizations worldwide. WhatsUp® Gold - More Visibility. Better Performance. Less Cost. Try it free for 30 days.
    1/2
    How many devices do you monitor on your company's network?
    2/2
    One last question before you visit our site:

    When do you plan to purchase a network performance monitoring solution?
  • Fyrewall Icon

    Fyrewall

    The Fyrewall follows the philosophy of free software firewall based on FreeBSD, on pfsense framework. The software in the Basic version is available free for download through the portal: www.fyrewall.com.br. It is available in 9 languages​​. English, Portuguese, French, Spanish, Italian, Russian, Japanese and Chinese

    Downloads: 0 This Week Last Update: See Project
  • HybirdOS

    HybridOS is an operating system dedicated to embedded devices, it's based on Linux kernel and FMSoft's mature software technologies, like embedded graphics system (MiniGUI), embedded web browser (mDolphin), and embedded J2SE solution (mPeer).

    Downloads: 0 This Week Last Update: See Project
  • Implementing TCCP

    Data exchange is a core part of all cloud systems so it becomes necessarily important to control access to data that are confidential and whose integrity influences the state of the system at any time.It can be proven that the administrator in a IaaS can easily perform some hidden and malicious task on unsuspecting customer machine. This is attributed to the fact that he/she possesses the root privilege to do so and forms an attack. A cold boot attack can easily be lauched amongst other attacks by the privilege user or system administrator.A simple attack scenario could be that a customer pays a virtual machine at Amazon EC2 (Provider) and the systemadmin (Privilidged User) who is, for instance, threatened to be fired, has access to the same virtual machine state, this priviledged user can easily leak customer’s data. There is a need to secure the computation state during communication and storage and we achieve this through the implementation of a trusted platform.

    Downloads: 0 This Week Last Update: See Project
  • YouLinux

    Our goal is to develop and implement an adoptable and human-friendly linux for home and small buiness/office, and provide excellence user experience.

    Downloads: 0 This Week Last Update: See Project
  • Previous
  • You're on page 1
  • Next

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you