The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your...
Create and explore infinite 3D voxel worlds in the definitive sandbox mining and crafting game.
Dia is a GTK+ based diagram creation program for Linux, Unix, Mac OS X and Windows released under the GPL license.
Gather and analyze accurate statistics and performance metrics, visualize it, get notified about current and potential issues without delay, and take advantage of our time-tested professional development and support.
rsync for cloud storage. Rclone is a command line program to sync files and directories to and from the cloud.
Cross-platform software for sharing a single mouse and keyboard between multiple computers at a workstation.
The virt-manager application is a desktop user interface for managing virtual machines through libvirt.
Caddy makes web development faster, easier, and more productive for busy people with busy websites.
Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. It reduces bandwidth and improves response times by caching and reusing frequently-requested web pages.
Bacula is a set of Open Source, enterprise ready, computer programs that permit you (or the system administrator) to manage backup, recovery, and verification of computer data...
Automatically enable HTTPS on your website with EFF's Certbot, deploying Let's Encrypt certificates.No screenshots yet
restic is a program that does backups right. The design goals are: Easy, Fast, Verifiable, Secure, Efficient, Free.No screenshots yet
Enterprise-ready monitoring solution that provides unparalleled flexibility for IT to address both immediate and unforeseen operational issues, including infrastructure and IT processes.
The sigrok project aims at creating a portable, cross-platform, Free/Libre/Open-Source signal analysis software suite that supports various device types (e.g. logic analyzers, oscilloscopes, and many more).
Project GoalsThe efforts emphasize portability, standardization, correctness, proactive security and integrated cryptography.No screenshots yet