The C# interface to Avahi service discovery.
Service discovery on a local network -- this means that you can plug your
laptop or computer into a network and instantly be able to view other people
who you can chat with, find printers to print to or find files being shared.
This kind of technology is already found in MacOS X (branded 'Rendezvous',
'Bonjour' and sometimes 'ZeroConf') and is very convenient.
Advanced Exchange Access (AXA) is a suite of tools and library code
that brings the capabilities of the Farsight Security Information
Exchange (SIE) right to a remote user's network.
Babel is a distance-vector routing protocol for
IPv6 and IPv4 with fast convergence properties.
It is based on the ideas in DSDV, AODV and
Cisco's EIGRP, but uses a variant of ETX
link cost estimation rather than a simple
hop-count metric.
Balance is a simple but powerful generic TCP proxy with round robin load
balancing and failover mechanisms. Its behaviour can be controlled at runtime
using a simple command line syntax.
The latest release now supports the definition of channel groups, connection
counting, and handling. Boosting the power, and versatility of balance, one
big step further.
Beanstalkd is a fast, distributed, in-memory workqueue service. Its interface
is generic, but is intended for use in reducing the latency of page views in
high-volume web applications by running most time-consuming tasks
asynchronously.
Binkd is a Fidonet mailer designed to operate via TCP/IP networks.
As a FTN-compatible internet daemon, it makes possible efficient
utilization of TCP/IP protocol suite as a transport layer in
FTN-based (Fido Technology Network) networks.
The BIRD project aims to develop a fully functional dynamic IP routing daemon.
- Both IPv4 and IPv6
- Multiple routing tables
- BGP
- RIP
- OSPF
- LDP
- L3VPN
- Static routes
- Inter-table protocol
- Command-line interface
- Soft reconfiguration
- Powerful language for route filtering
This is a Unix version of the client program for Back Orifice. This program
when installed on the victim machine hides itself. It can be used to remotely
administer a Windows 95/98 machine.
Strigi analyzers for network-related file formats.