Portsmith is an application-based firewall that is designed to interact with authorized users, and offers an easy-to-use browser driven interface. Portsmith's unique features include its core logic and its interface. Its logic specifies that ports are kept in a closed position until an authorized user logs into the Portsmith interface and triggers them open. When opened, the ports are only accessible from the authorized user's current IP address.
Proto Balance is a load balancing and traffic management system that can handle up to 10,000 concurrent connections and 20,000 downloads per second. Proto Balance is a load balancer and TCP traffic port forwarder for high availability. It features an easy-to-use Web interface that requires minimal knowledge of networking and no command-line experience. Its target audience includes enterprise cluster providers, Internet service providers, and network administrators.
MultiLoad is a load balancer that redirects HTTP requests to pre-defined servers/locations. It gives the provider a way to balance the traffic and hides the real download location. It allows you to manage different version of each download. It is also a load balancing server extension. You can distribute files on some servers so that a downloaded file can be loaded form different servers. These servers can have different priorities to control the active traffic.
CD Linux Server is an embedded Linux system on a bootable live CD. It can be used to set up mail, Web, file, FTP, proxy, DHCP, DNS, MySQL, LDAP, and other services very quickly. The mail server includes antivirus, antispam, and mail recorder features. It can be used for free for up to 10 accounts, while the advanced version is licensed for an unlimited number of users. There is not any restriction against the time.
PhishBouncer is an anti-phishing platform based on an HTTP/HTTPS proxy integrating anti-phishing checks that do not depend on block lists or Phish signatures. The checking algorithms make use of the attributes of the Web site being visited, the structure and properties of the referring URL, and the Web site's association with other legitimate Web sites that the user interacts with. The checks are implemented as plug-in interceptors, and it is easy to modify them and add or remove new checks.