ProSSHD Version 1.0 - SSH server and client
Date: September 3, 2007
Labtam is pleased to present a new software product ProSSHD Version 1.0. It is our first release of ProSSHD.
We have developed an SSH server and client for Windows providing maximum security from PC to Host over a Company LAN/WAN/Intranet or Internet. SSH is the industry standard for remote logins. It addresses most of the critical issues which concerns most users while on the internet; cyber hackers stealing passwords and other important information. ProSSHD brings you typical remote system administration, file transfers, and access to corporate resources over the Internet. It brings Security to a PC and a company LAN/WAN or Intranet.
ProSSHD is SSH server and client for the Windows package for Windows.
SSH client was implemented as an extension DLL. It is a superb terminal emulator/telnet client for Windows. It provides SSH capabilities to ProSSHD without sacrificing any of existing functionality. Furthermore, ProSSHD has been developed entirely outside of the USA, and can be sold anywhere in the world (apart from places where people aren't allowed to own cryptographic software).
NOTES on this release (PLEASE READ):
1. The Beta MS Windows XP/2003/Vista x64 NFS-Client can be installed by running the self-extracting archive file, "nfsclx64.exe". This file and "nfsclx64.txt" can be found on the Internet site.
2. Use the "setup -wauto -s" command line (instead of "setup -auto") to start the "Silent Installation".
Please read more about ProSSHD in product home section of Labtam Inc site.
Single User licenses are at $40.00 USD. Please visit the Software Pricing page for pricing on Multiple Licenses.
If at anytime you require any information or assistance please do not hesitate to e-mail us at:sales@Labtam-inc.com
The programs associated in this package may send and/or receive broadcast IP requests. Since such packets cannot cross the nearest firewall/gateway/router, please be sure that these IP requests are invisible from outside your network. We assume that such behavior cannot be considered as "Hacking" or "Trojan horse's action".
|Home | Product | Download | Order Now | Upgrade | Support | Pricing | Company Information | Contact Us|
|Copyright © 1999 - 2003 LabtamTM Inc.|