Read more

CCProxy 8.0

CCProxy – Windows Proxy Server   CCProxy is easy-to-use and powerful proxy server. CCProxy can support broadband, DSL, dial-up, optical fiber, satellite, ISDN and DDN connections, it helps you build your own proxy server and share Internet connection within the LAN efficiently and easily. CC Proxy Server can act as an HTTP, mail, FTP, SOCKS, […]

Read more

Dell Customized Image of VMware ESXi 6.5 U1 Version A00 (Build 5969303)

Dell Customized Image of VMware ESXi 6.5 Update 1Version A03 Introduction This document helps you to deploy VMware ESXi 6.5.x on Dell PowerEdge servers, and provides specific information about recommended configurations, best practices, and additional resources. Dell offers the following VMware editions: vSphere Essentials Plus vSphere Standard vSphere Enterprise vSphere Enterprise Plus VMware vCenter Server […]

Read more

ntopng 2.4.160627 Professional

ntopng 2.4.160627 Professional | 37.0 MB High-Speed Web-based Traffic Analysis and Flow Collection. ntopng is the next generation version of the original ntop, a network traffic probe that monitors network usage. ntopng is based on libpcap and it has been written in a portable way in order to virtually run on every Unix platform, MacOSX […]

Read more

nProbe 7.5.170507

nProbe 7.5.170507 | 26.7 MB In commercial environments, NetFlow is probably the de-facto standard for network traffic accounting. nProbe includes both a NetFlow v5/v9/IPFIX probe and collector that can be used to play with NetFlow flows. This means nProbeâ„¢ can be used: To collect and export NetFlow flows generated by border gateways/switches/routers or any other […]

Read more

Acunetix Web Vulnerability Scanner 11.0.17095.1158 Retail

Web Vulnerability Scanner 11.0.17095.1158 Retail | 46.15 MB With the uptake of cloud computing and the advancements in browser technology, web applications and web services have become a core component of many business processes, and therefore a lucrative target for attackers. Over 70% of websites and web applications however, contain vulnerabilities that could lead to […]