Secure File Transfer for Windows with Cerberus by Redwood
Protect and share files over FTP/S, SFTP, HTTPS and SCP with the #1 rated Windows file transfer server.
Cerberus supports unlimited users and connections on a single IP, with built-in encryption, 2FA, and a browser-based web client — all deployable in under 15 minutes with a 25-day free trial.
Try for Free
$300 in Free Credit Towards Top Cloud Services
Build VMs, containers, AI, databases, storage—all in one place.
Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
Side-by-side diff viewer, editor and merge preparer
tkdiff is a graphical front end to the diff program. It provides a side-by-side view of the differences between two text files, along with several innovative features such as diff bookmarks, a graphical map of differences for quick navigation, and a facility for slicing diff regions to achieve exactly the merge output desired.
Integrated Development Environment for some microcontrollers based on 8051(e.g. AT89S8253). Supported languages are Assembly and C. It has its own simulator, assembler, editor and many other tools. See the project web site for more details and the newest updates.
Please note that OWFS sourcecode, and all Issue/Tickets/merge requests have now been moved to https://github.com/owfs/owfs/.
Developer mailing lists will still be kept at Sourceforge.
----
OWFS -- 1-Wire file system. Use the Dallas 1-Wire and iButton chips with standard filesystem commands. Create temperature loggers. Monitor everything. OWHTTPD -- same system, only used as a light weight web server.
The Open Design and Integration Environment is a toolbox of C and TCL code designed to introduce people to programming in a friendly way. It is also designed to be robust enough to novices to develop useful applications.
Software from LoCI Laboratory is devoted to information logistics, the study of the flexible coscheduling of the physical resources that underpin computer systems: storage, computation, and data transmission. We use IBP, L-Bone, exNode and LoRS.
ghack ("grid hack") is meant to allow small groups of people to voluntarily share their computer resources to work on collective problems. Goals are: easy to use (e.g. scientific coders), easy to deploy (e.g. no elevated priviliges or open firewall ports
TclSigX is a client for the SigX dynamic signature image system. It gathers infomation from your computer and sends it to the SigX server. TclSigX works best on Linux but also works on other POSIX systems. SigX info can be found at http://sigx.yuriy.net
The Pawn will make it possibly for you to tell the computer exactly what you would like it to do. Fiction. No its reality now. The highly customizable slackware will be the base for Pawn.
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
CANTCL is the Canonical Tcl Archive Network and will provide an online repository for binary and sourcecode distributions of Tcl extensions and applications.
The TclSOAP package provides a mechanism to bind Tcl command procedures to remote procedure calls using the Simple Object Access Protocol (SOAP) and XML-RPC over HTTP. Both client and server code is provided.
PRATIMA, an Asynchronous Remote Volume Replicator for Linux:
Pratima performs online, real-time, reliable and efficient block level data replication to a remote computer over a network in both synchronous and asynchronous modes for Linux.
A Secure, Firewall-Friendly Platform for Peer-to-Peer Networking.
With a few mouse clicks, request remote access to colleagues' computer desktops, transfer files, sketch & chat, or videoconference. Automatic, authenticated & encrypted tunneling!
ISO 17799 - Code of practice for information security management. Creation of methodology and documentation for audit adapted to ISO. One is made up of an introduction on general aspects of the security of the information.
Embedded churn will provide developers the freedom to configure an embedded system for any target architecture from a defined template . The ability to deploy the custom image on a flash based device depending on the application of the embedded linux de