No hidden charges. No surprise bills. Cancel anytime.
Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
Start Free
Secure File Transfer for Windows with Cerberus by Redwood
Protect and share files over FTP/S, SFTP, HTTPS and SCP with the #1 rated Windows file transfer server.
Cerberus supports unlimited users and connections on a single IP, with built-in encryption, 2FA, and a browser-based web client — all deployable in under 15 minutes with a 25-day free trial.
Perix is a 16/32/64-Bit protected mode kernel, bootable and capable of running with or without an operating system. It is written in Turbo Pascal 7.0 for DOS, Delphi 7.0, Pascal Pro, Virtual Pascal v2.1, Delphi XE2 64-Bit, TASM, TASM32 and JWASM.
The latest version, 0.01I, supports multi-processor.
Added Open Watcom C++ and Borland C++ examples.
File system navigation is made easier through the use of color highlighting and sort groups.
The functionality of Far Manager is greatly extended by external DLL modules — plugins (made possible by a special set of interfaces — the Plugins API). For example: archive support, FTP client, temporary panel and network browser are all implemented as plugins included in the standard distribution of Far.
AsmFile is a filemanager for terminals or the Linux console. It is written in assembler for small size and speed. The design uses two window approach like mc and other filemanagers.
AsmMgr is a filemanager that is configured to support the AsmIDE family of developemnt tools. It can also be configured as a "mc" clone. Features include: file minipulation, two pannel views, mouse support, integrated shell, and more.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.