IISKeeper allows you to easily protect resources of your site by password. A protected resource is a folder containing subfolders and files or a single file.
WebPartner–Bringing the Web to You– Publishers configure “web channels” to pull the latest content from wherever it exists across the world-wide web. Channel publishers and readers comment, contribute & respond to the late
Bullet-proof SMTP POP3 server software used by corporations and Internet Service Providers as an ultra fast and reliable mail server. Its security features and options let you prevent DDoS attacks and block SPAM. It is also ideal for laptop PC users
Secure messaging solution with web collaboration containing SMTP/IMAP/POP3/LDAP services along with integrated anti-virus and advanced anti-spam protection. Native Outlook support provides synchronization of mail, contacts, tasks, and calendar items.
Recovery Toolbox for Lotus Notes efficiently solves the problem of ad hoc data recovery from damaged .NSF database files. The work of the program is based on a convenient recovery wizard that guides the user through the process.
In a nutshell Jenkins CI is the leading open-source continuous integration server. Built with Java, it provides over 400 plugins to support building and testing virtually any project.
Lepide Event Log Manager provides an efficient way to view and manage the event logs by archiving it centrally. It becomes easy to manage and monitor the event logs when they are centrally reposited.
By using the Open Source Red5 Media Server, you are developing with a truly open and extensible platform that can be used in Video Conferences, Multi-User Gaming and Enterprise Application Software.
PHP Point Of Sale is a web based point of sale system
JSPWiki, a feature-rich and extensible WikiWiki engine built around the standard J2EE components (Java, servlets, JSP).
Gregarius is a web-based RSS/RDF/ATOM feed aggregator, designed to run on your web server, allowing you to access your news sources from wherever you want.
Make your email server intercept viruses.
Groupware/Content Management System solution.
With Brilliant Database you can easily develop databases to manage any kind of data you need the way you want. Creating forms, reports, formulas, buttons, menus, relations or configuring users and access becomes fun with help of visual designers...
Recovery Toolbox for Exchange Server is a compact, yet powerful recovery tool for restoring data from damaged or corrupted data files of Exchange Server 2003/2007. Recovers Exchange Server data - contacts, messages, tasks, etc-into Outlook PST files
Sending emails is now easy. When you want to save money on delivering large amounts of email messages, our solution is best for you. Our SMTP server delivers emails directly to their destinations. No limitations and no additional monthly payments.
SMS Gateway software for software developers. They can add SMS functionality to their application (supported: SQL, Files, XML, PHP, ASP, Delphi, Java, etc).The sending is done using a GSM modem attached to the PC or an IP SMS connection over the net
SQL database recovery tool is data recovery software to repair corrupt SQL database files (.mdf). Tables, Views, triggers, stored procedures are easily recovered with the repaired unique keys, primary keys and foreign keys.
AFW Proxy Server - an excellent proxy server for your applications! A typical problem for the modern office, business or home network - to provide Internet access to all users via a LAN connection to the IProxy server for share Internet connection.
Intuitive web based free help desk software by Web Help Desk includes: Incident Management - Knowledge Base - LDAP / AD Sync - Two-way Email Integration - Reporting. Unrestricted Web Help Desk Lite Edition features for Linux server installation.
Laptop windows NTFS partition data recovery utility is non destructive read only application that helps to search, locate and retrieve your lost missing inaccessible or deleted data including pictures, text documents, music files and games files.
Mil Firewall blocks all network attacks and information leaks from your computer. With Mil Firewall you can use Internet and local networks for work or entertainment while keeping full control over what goes in and what goes out of your computer.