(Page 3 of 89)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >

Platform: Windows NT

Secret Server
Added 2007-04-09
by Thycotic Software
Secret Server is a password management system designed for colleagues in enterprises to securely store and share secrets. Secrets include but are not limited to: passwords, bank account information, product license keys, etc.

Aurora Password Manager
Added 2007-04-08
by Animabilis Software
Aurora Password Manager is a full-featured password storage and management solution. This software will store your sensitive data such as website and e-mail passwords, credit card account data, cellular phone PIN codes, etc. in a secure database. The database is encrypted with a 256-bit Advanced Encryption Algorithm, a standard adopted by the U.S. Department of Defense that would take at least 500 years to crack. To increase security even more, the password database can be stored on removable media (such as a USB flash drive) and connected to the computer only when needed. To make sure that you always use the most secure passwords possible, Aurora Password Manager will generate passwords as needed. A number of predefined templates, including web-form, e-mail account, credit card and others, will help you to easily add passwords to the database. The Find function will enable you to find the password you need quickly, even if there are thousands of passwords in the database. Aurora Password Manager is shipped with an IE toolbar plug-in that greatly simplifies filling web forms that contain passwords or any other data by storing the information and entering it automatically when necessary. Aurora Password Manager is ideal for both corporate and individual use: the program supports multiple users and allows them to access the password file simultaneously. In fact, the password file is a full-featured database that supports SQL, tables and locking. In addition, the program features a completely configurable interface and several visual styles. Aurora Password Manager supports all Windows versions starting with Windows 98, and can be downloaded absolutely free.

Activity and Authentication Analyzer
Added 2007-03-13
by Valient Newman
Security software destined to comprehensive analysis of the user traces (evidences) left after work. AAAnalyzer allows user to search the traces left in system registry, edit registry keys related to the activity and authentication analysis, eradicate them in safe way, keep search log-files, and backup made changes. Utility works in 9x/NT/2000/XP/2003 Windows - and needs additionally only Internet Explorer version 4 or higher

Scuba by Imperva
Added 2007-03-05
by Imperva
Scuba by Imperva is a free, lightweight Java utility that scans Oracle, DB2, MS-SQL, and Sybase databases for known vulnerabilities and configuration flaws. Based on its assessment results, Scuba creates clear, informative reports with detailed test descriptions. Summary reports, available in Java and HTML format, illustrate overall risk level. With Scuba by Imperva, you are quickly on your way to meeting industry-leading best practices for database configuration and management.

SSA Security System Analyzer
Added 2007-02-21
by SSA Team
A local vulnerabilty analyzer based on OVAL concept. http://www.security-database.com/ssa.php 1.5 Final Release * NOW SSA Security System Analyzer in added to OVAL.mitre.org compatibility program o http://oval.mitre.org/compatible/questionnaires/21.html * NOW fully based on OVAL 5.2 Interpreter. * Added OVAL XML Database Plug-in. o View OVAL ID Information o Search by OS and OVAL ID + Double click on entry and get more information (linked to OVAL.mitre.org and security-database.com) o More information about CVE (CVSS, Related sources, Related missed patches....) * Added function Stop/Reload in SSA * Improved performance in SSA Core Scanner * Fixed bugs (function checks, abnormal scan abort...) * Fixed bugs in Updater Plug-in * Added second progress bar in Updater Plug-in to indicate the stages left to be processed.

Windows Privacy Tray (WinPT)
Added 2007-02-13
by Timo Schulz
WinPT is a taskbar front-end for GnuPG which includes key management, encryption via the clipboard, direct file encryption and support for OpenPGP smartcards.

S.I.T.H. 2048bit Secure Client
Added 2007-01-25
by
PROTEXX (SITH) Secure Wireless Secure Information Technology Highway (SITH)™ is next generation wireless technology, developed by PROTEXX, that provides enhanced levels of security and greater user authentication to eliminates the ability of anyone from monitoring your Internet activity or stealing your personal or corporate data.The Secure Information Technology Highway™ ensures that server, client and remote communications are done with a secured environment with more than 10X the security level by today's standards.

Source Security
Added 2007-01-15
by
sourcesec.com provides Web-based access to code auditing applications, and was created to assist developers and users in auditing their programs for vulnerabilities. You can upload your code for static analysis by RATS, Flawfinder and ITS4 as applicable - the C/C++, PHP Python and Perl languages are supported. Additionally, a simplified search function is available which easily allows efficient Web searches for security-related information.

Scuba by Imperva
Added 2007-01-05
by Imperva
Scuba by Imperva is a free, lightweight Java tool that scans Oracle, DB2, MS-SQL, and Sybase databases for hundreds of software vulnerabilities. It also detects configuration flaws like insecure passwords, unsafe processes, unrestricted permission levels, and more. Furthermore, it generates HTML and Java reports that show overall security risk level and detailed information about each vulnerability – so you can pinpoint configuration risks within minutes. Scuba by Imperva detects hundreds of database vulnerabilities and configuration issues. And better yet – it helps you meet industry-leading best practices standards for database configuration and management.

Technitium MAC Address Changer v4
Added 2006-12-19
by Shreyas Zare
Technitium MAC Address Changer allows you to change Machine Access Control (MAC) Address of your Network Interface Card (NIC) irrespective to your NIC manufacturer or its driver. It has a very simple user interface and provides ample of information regarding each NIC in the machine. Every NIC has an MAC address hard coded in its circuit by its manufacturer. This hard coded MAC address is used by windows drivers to access Ethernet Networks (LAN). This tool can set a new MAC address to your NIC, bypassing the original hard coded MAC address. Technitium MAC Address Changer is a must tool in every security professionals tool box. Technitium MAC Address Changer v4.0 is coded in Visual Basic 6.0.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus