There's no event quite like OSCON—the best place on Earth to sharpen your skills and discover new techniques, making you better at what you do and igniting your love of all things digital. You'll find everything open source: languages, communities, best practices, products and services. Join us May 8-11 in Austin, TX, and let OSCON ignite your love of all things digital!Sponsored Listing
- Other Operating Systems (3)
- Windows (3)
- Grouping and Descriptive Categories (2)
- Linux (2)
- Modern (2)
- BSD (1)
- Embedded Operating Systems (1)
This program is intended to be used by Network Administrators. It is used to test connectivity on specific ports. THis program returns a simple pass or fail. Java 6 is required.31 weekly downloads
Our aim is providing fixed nodes with redundancy, share unused bandwidth, and create hotspots with base services(web,email,IM,etc.) for any roaming user. GOAL - To make sharing your excess bandwidth as easy as setting up a NAT (Or XP ICS). Admins Needed!
The SecurityStalker(c) & IA Defender(c) projects are scalable, solutions to fighting internet abuse aimed at single user, SOHOs' and corporate network environments. Reacts to both external and internal threats. Extensive reporting. SpamPal aware.
You can start backing up your Hyper-V and VMware hosts in a matter of minutes. Then set up a backup schedule and replicate backups offsite for added disaster recovery. You can even granularly restore Files or Exchange Items directly, or instantly boot a VM from backup. Download today and get a chance to WIN a Nintendo Switch!Sponsored Listing