Showing 4 open source projects for "totalbypass proxy software"

View related business solutions
  • SKUDONET Open Source Load Balancer Icon
    SKUDONET Open Source Load Balancer

    Take advantage of Open Source Load Balancer to elevate your business security and IT infrastructure with a custom ADC Solution.

    SKUDONET ADC, operates at the application layer, efficiently distributing network load and application load across multiple servers. This not only enhances the performance of your application but also ensures that your web servers can handle more traffic seamlessly.
  • Cyber Risk Assessment and Management Platform Icon
    Cyber Risk Assessment and Management Platform

    ConnectWise Identify is a powerful cybersecurity risk assessment platform offering strategic cybersecurity assessments and recommendations.

    When it comes to cybersecurity, what your clients don’t know can really hurt them. And believe it or not, keep them safe starts with asking questions. With ConnectWise Identify Assessment, get access to risk assessment backed by the NIST Cybersecurity Framework to uncover risks across your client’s entire business, not just their networks. With a clearly defined, easy-to-read risk report in hand, you can start having meaningful security conversations that can get you on the path of keeping your clients protected from every angle. Choose from two assessment levels to cover every client’s need, from the Essentials to cover the basics to our Comprehensive Assessment to dive deeper to uncover additional risks. Our intuitive heat map shows you your client’s overall risk level and priority to address risks based on probability and financial impact. Each report includes remediation recommendations to help you create a revenue-generating action plan.
  • 1
    Distrobox

    Distrobox

    Use any linux distribution inside your terminal

    Use any Linux distribution inside your terminal. Enable both backward and forward compatibility with software and freedom to use whatever distribution you’re more comfortable with. Distrobox uses podman, docker or lilipod to create containers using the Linux distribution of your choice. The created container will be tightly integrated with the host, allowing sharing of the HOME directory of the user, external storage, external USB devices and graphical apps (X11/Wayland), and audio. Simply put...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 2
    Microsoft Azure CLI

    Microsoft Azure CLI

    Azure command-line interface

    .... Snippets for commands, inserting required arguments automatically. Run the current command in the integrated terminal. Run the current command and show its output in a side-by-side editor. Show documentation on mouse hover. Display current subscription and defaults in the status bar. The software may collect information about you and your use of the software and send it to Microsoft. Microsoft may use this information to provide services and improve our products and services.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    BaGet

    BaGet

    A lightweight NuGet and symbol server

    ..., you can run BaGet behind a Windows IIS proxy. This has many benefits, including automatic restarts on reboots. You may need to give special permissions to the top-level BaGet folder so that the app can persist in its state. This is necessary as the Application Pools' identity is a virtual account that isn't recognized by the Windows User Management Console.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    Net Tools for Development

    A collection of network-oriented tools

    This Eclipse RCP application contains several free, useful network tools. Among others: - Standard network tools: ping, netstat, traceroute, nslookup - A port scanner - Servers: HTTP, FTP, TFTP servers - an HTTP proxy - A TCP tunnel - Clients: FTP client, embeddable PuTTY (for Windows only)
    Downloads: 0 This Week
    Last Update:
    See Project
  • Create and run cloud-based virtual machines. Icon
    Create and run cloud-based virtual machines.

    Secure and customizable compute service that lets you create and run virtual machines on Google’s infrastructure.

    Computing infrastructure in predefined or custom machine sizes to accelerate your cloud transformation. General purpose (E2, N1, N2, N2D) machines provide a good balance of price and performance. Compute optimized (C2) machines offer high-end vCPU performance for compute-intensive workloads. Memory optimized (M2) machines offer the highest memory and are great for in-memory databases. Accelerator optimized (A2) machines are based on the A100 GPU, for very demanding applications.
  • Previous
  • You're on page 1
  • Next