an ultimate internet traffic control and monitoring tool designed for Win98/Win98 SE, WinME, Win2000, Win2003 and WinXP. You can use NetLimiter to set download/upload transfer rate limits for applications or even single connection and monitor their intern
A system for stealthy authentication across closed ports, communication in which information arrives encoded in the form of connection attempts to closed ports.
component-based, modular and open-architecture simulation environment with strong GUI support and an embeddable simulation kernel. Its primary application area is the simulation of communication networks and because of its generic and flexible architectur
science which solves a large problem by giving small parts of the problem to many computers to solve and then combining the solutions for the parts into a solution for the problem.
a modular, plugin-driven peer-to-peer client framework which is designed with true multi-network downloads in mind. It can be used directly via the built-in shell functionality, or via external user interfaces.
provide free bandwidth for your video, podcast, software download, or any other file you want to post. We will support downloads of any quantity and are adding infrastructure to support very large volumes of downloads. (ad based)
A joint project of the Electronic Frontier Foundation and Harvard, Stanford, Berkeley, University of San Francisco, University of Maine, George Washington School of Law, and Santa Clara University School of Law clinics
a list of 50+ similar services that are absolutely free and require no e-mail registration to use. Included in the list are file size limits, download limits and the amount of time the file remains on the server for download.
help setting up port forwarding on your router or firewall. Many Internet users are not aware of how to configure their router or firewall in order to use applications like Peer-to-Peer file sharing (PtoP), Internet Games
a server for chess players to play against each other over the Internet. FICS supports tournaments, lectures, live game relays, chess variants (Suicide, Bughouse, Crazyhouse, Atomic) and lots more.
can identify and stop sites trying to phish (steal) your personal information or money. The OpenDNS phishing protection works with all operating systems and browsers, and complements any other security measures already in use, such as a firewall and anti-
this search engine monitors 3,649 IRC networks, IRC channels, more active IRC users, and of course, over 5,000 pages of information on IRC networks, their services, and their servers!
is free, it only takes seconds to download and you don’t even need to install it, so you can download Browzar time and time again, whenever and wherever you need it to protect your privacy.
web server scanner which performs comprehensive tests against web servers for multiple items, including over 3300 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Scan items and plugins are
Content Types, Content Subtypes, Character Sets, Access Types, and conversion values for MIME mail will be assigned and listed by the IANA. [RFC2045,RFC2046]
a multiplayer, text-based online game based on the Discworld books as written by Terry Pratchett. On Discworld you will meet many of the characters from those books. Terry's books are humorous fantasy and the game retains that spirit.
an application that uses the power of Google's global computer network to make web pages load faster, local cache, prefetching, data compression. Currently a Google Labs product. (probably good for very slow connections and as a general proxy)
Using email for almost everything from FTP downloads/uploads or Free WEB site hosting to using it for gatter FINGER or WHOIS information (telnet is still not available :)
a simple client and server to allow the forwarding of Lan packets over the Internet or in an intranet network. It was made to play multiplayer games with no direct IP connection when players are not in the same local network
continuation of the 2000 book Reinventing Comics, "I Can't Stop Thinking!" provided a forum for ongoing speculations about digital comics. Originally sponsored by The Comic Reader (now offline, apparently). Last 2 episodes are about micropayment
site to educate the American public about the law and technology of government surveillance in the United States, providing the information and tools necessary to evaluate the threat of surveillance and take appropriate steps to defend against it.
Certain Internet service providers have begun to interfere with their users' communications by injecting forged or spoofed packets - data that appears to come from the other end but was actually generated by an Internet service provider (ISP) in the middle. This spoofing is one means (although not the only means) of blocking, jamming, or degrading users' ability to use particular applications, services, or protocols. One important means of holding ISPs accountable for this interference is the ability of some subscribers to detect and document it reliably. We have to learn what ISPs are doing before we can try to do something about it. Internet users can often detect interference by comparing data sent at one end with data received at the other end of a connection.