2015年7月23日 星期四

Windows Server 2012 R2 Essentials

Windows Server 2012 R2 Essentials

New! Beginner's Guide to Open Source Intrusion Detection Tools

This SF Update Is Sponsored By: AlienVault
New! Beginner's Guide to Open Source Intrusion Detection Tools
If you aren't already running network IDS, you should be. Whether you need to monitor hosts or the networks connecting them to identify the latest threats, there are some great open source intrusion detection (IDS) tools available to you. This guide provides an overview of some of the most popular Open Source IDS tools, along with pros/cons of each.
Download Now>>

Featured Editor's Review for July

For our July "Editor's Pick" Project of the Month we selected OPTOSS NG-NetMS, a real-time, next-gen network management system (NG-NetMS), which provides visibility of entire networks, ITC infrastructures, and interconnected computing resources. It gives participating operators end-to-end network visibility of cloud services and assists in quickly localizing the root causes of potential incidents and outages. The main benefit of NG-NetMS tool is that it provides a central vantage point into the security aspects of ICT services. OPTOSS NG-NetMS is an indispensable tool for rapid data collection during audits and network infrastructure assessments. Download OPTOSS NG-NetMS now.

Coming Soon: The newest release of OPTOSS NG-NetMS (3.4) will be out next week.

Top Downloaded Projects and Call for Your POTM Vote

The vote for September 2015 Community Choice SourceForge Project of the Month is now available, and will run until August 15, 2015 12:00 UTC. Here are the candidates:

usm: A unified slackware package manager that handles automatic dependency resolution. It unifies various package repositories including slackware, slacky, ponce, salix, and alien. It supports slackbuilds.org and builds from source. Download usm now.

K-Meleon: A fast and customizable Web browser that can be used instead of Internet Explorer on Windows. Powered by the same Gecko engine as the Firefox and Mozilla browsers, K-Meleon provides users with a secure browsing experience. Download K-Meleon now.

LXLE: A full featured OS for an aging PC. Aging hardware needs the right system on it to squeeze a few more years out of your current system without sacrificing performance, capability, usability, and aesthetics. Download LXLE now.

gnuplot: A famous scientific plotting package, features include 2D and 3D plotting, a huge number of output formats, interactive input or script-driven options, and a large set of scripted examples. Download gnuplot now.

NAS4Free: An embedded Open Source Storage distribution and supports sharing across Windows, Apple, and UNIX-like systems. NAS4Free can be installed on Compact Flash/USB/SSD media, hard disk or booted of from a Live CD with a USB stick. Download NAS4Free now.

PSeInt: A pseudo-code interpreter for spanish-speaking programming students. Its main purpose is to be a tool for learning and understanding the basic concepts about programming and applying them with an easy understanding spanish pseudocode. Download PSeInt now.

Parrot Security OS: A Cloud friendly operating system designed for pentesting, computer forensics, reverse-engineering, hacking, Cloud pentesting, privacy/anonymity, and cryptography. It is based on Debian and developed by the Frozenbox network. Download Parrot Security OS now.

antiX-Linux: A fast, lightweight, and easy-to-install linux live CD distribution, based on Debian Testing, for Intel-AMD x86 compatible systems.Download antiX-Linux now.

NAPS2 (Not Another PDF Scanner 2): A document scanning application with a focus on simplicity and ease of use. Scan your documents from WIA- and TWAIN-compatible scanners, organize the pages as you like, and save them as PDF, TIFF, JPEG, PNG, and other file formats. It requires .NET Framework 4.0 or higher. NAPS2 is currently available in 19 different languages. This is a fork of the NAPS project with many bug fixes and other improvements. Download NAPS2 (Not Another PDF Scanner 2) now.

2015年7月22日 星期三

Application Security Testing - Get Started Now

Application Security Testing - Get Started Now
Learn More
Finding and fixing vulnerabilities in your software is critical to the security of your business. But it takes time and resources you may not have.
HP Fortify on Demand is a managed application security testing service that helps you identify and mitigate vulnerabilities that may expose your business to attack. Run static, dynamic or mobile scans to quickly pinpoint problems in legacy, purchased or open source applications. Try Fortify on Demand today and get your first 5 scans for free!
Download Now »

2015年7月21日 星期二

4大Google趨勢搜尋服務新功 能

4大Google趨勢搜尋服務新功 能

相信不少人都會用Google Trends找出熱門的話題和搜尋問題,近日Google Trends進行了大規模更新,透過與全球上百位記者和其他人交流中收集到的反饋,基於Google Search為用家提供 1 個更快、更深入、更全面的觀點,令用家可從Google Trends網站找到世界大事的實時數據了解事情來龍去脈。

16-Petaflop Supercomputer on Hold to Wait for 'Skylake' Xeon

16-Petaflop Supercomputer on Hold to Wait for 'Skylake' Xeon

Free Trial: Intel Parallel Studio XE 2015
Deliver top application performance and reliability with Intel Parallel Studio XE 2015. These C ++ and Fortran tool suites simplify the development, debugging, and tuning of code. Try it out for free.

Powerful 'Skylake' Xeon Chip to Debut Soon, but Not Yet for HPC

Powerful 'Skylake' Xeon Chip to Debut Soon, but Not Yet for HPC
The "Skylake" Xeon aimed at the "enthusiast" market boosts power up to 29% more than current chips, but the much bigger server boost isn't due until 2017. Find out more and let us know what you think in the comments section on our story page.

2015年7月14日 星期二

Dodging the Dangers of Explicit Multithreading

Dodging the Dangers of Explicit Multithreading
With all processors now having multiple cores even on mobile devices, an application that seeks high-performance computing needs to use multiple processes or threads. The temptation is to program multiple threads yourself, but this can be a journey fraught with perils. David Bolton walks you through some of those perils and suggests ways to mitigate them.

2015年7月11日 星期六

do-it-yourself (DIY) approach to IT

The CA/BF, the governing body that manages the use of SSL certificates, has determined that public CAs will no longer issue certificates with internal names after November 2015. The logic for using SSL certificates has not changed, but organizations will have to adopt new ways of issuing them.
These rule changes do not mean that internal certificates are no longer available for use, only that public CAs cannot issue certificates with internal names that are not authenticated. Although running your own CA might sound appealing, to those inclined to the do-it-yourself (DIY) approach to IT operations, there are a number of factors to consider.

2015年7月8日 星期三

Reduce the cost and risk of testing SAP projects

In this eBook, we share how IBM software and solutions can help an organization manage quality and begin testing SAP solutions and the integrations they depend on earlier, continuously, while testing smarter.
Learn to:
  • Reduce the cost and risk of testing SAP projects
  • Test SAP projects using IBM software
  • Realize the value of standardized testing
Download Now »

2015年7月7日 星期二

Free Webinar: Graphics Performance Analysis with Intel® GPA

Free Webinar: Graphics Performance Analysis with Intel® GPA
Learn graphics performance analysis workflows for your Windows and Android games. Use Intel® INDE Graphics Performance Analyzers to optimize your game and identify issues that negatively impact your framerate.

How to Reverse Engineer Your Way to Modernized Code

How to Reverse Engineer Your Way to Modernized Code
Many software developers are tasked with completely refactoring legacy code into new code bases using modern paradigms. An effective approach can be Model-Driven Engineering, where the old code is reverse engineered so that its functionality and hierarchy are fully understood before a new model is forward engineered using current techniques so that the final product is worthy of contemporary standards. Rick Leinecker explains. Take a look and let us know what you think in the comments section on our story page.

hese resources have offered unparalleled

These resources have offered unparalleled sources of data with which to identify, analyze, and provide informed commentary on emerging trends in attacks, malicious code activity, phishing, and spam.
Read this report for a discussion on:

  • Trends and patterns across the globe and their impact
  • Best practices to mitigate risk for online businesses
  • What actions you can take to protect your site and your customers