3D Business Icons is a collection of business-related icons for Web sites and software projects. it contains images in 16x16, 20x20, 24x24, 32x32, 48x48, 128x128, 256x256, and 512x512 pixel sizes. All of the images are hand-crafted by professional graphic designers and present smooth, well-rounded edges. The file formats provided are ICO, BMP, and PNG with a transparent background.
Altimate Firewall is a small and easy-to-use firewall, based on a hardened Gentoo system. It has an intuitive and easy-to-use Web interface. The Altimate Firewall uses Shorewall (LAN, WAN, DMZ), OpenVPN, PPTPD, IPSEC, and many more. It includes Avira WebGate and MailGate for safer browsing and for securing your email messages. The network settings can be easily managed by a non-professional.
Aobo Internet Filter Professional is an Internet filtering and porn blocking tool that helps Mac OS X users to block porn websites, stop games and applications, and record accessed Web sites. It blocks websites by keywords and URLs. Users can easily export and import settings, and synchronize settings with an FTP site.
Bitrix is a full featured enterprise intranet portal that features integrated communication, collaboration, social networking, document sharing, and task management tools. It has a quick setup and deployment process, multiple template options, and integration with Active Directory, and provides WebDAV support, event calendars, contacts and staff profiles, instant messaging, groupwork, and task management. Information can be searched across the entire content (documents, files, pages, etc.) Video, photo, and audio files ae supported.
Collax V-Family is a management suite based on a 64bit Linux system and KVM to provide server virtualization. It offers solutions for single virtualization hosts, as well as high availability management on two or more nodes, allowing embedded HA storage using DRBD and iSCSI. By using live snapshots, automatic live migration, and incremental backups, the availability of virtual machines is increased tremendously in case of hardware and software maintenance or even hardware failures. Virtual network switches and the protocols GVRP, LLDP, and RSTP help to set up a virtual DMZ.