(Page 3 of 5)   < Prev  1 2 3 4 5  Next >

Category: System Security Management » Monitoring

Network Equipment Performance Monitor
Added 2006-03-16
by Nova Software, Inc.
NEPM is a very general, highly configurable, two part software system that monitors any type of logged data from IP networked equipment and reports it via E-mail and web pages. Current conditions and history from systems based on Windows NT/2000 and UNIX can be tracked and reported. Most major server, switch and router systems can be monitored, without running agents on the target systems. Many networks behind separate firewalls can be reported on at one central site, and hard-to-reach isolated nets can be accessed. NEPM itself is system independent and can be hosted on either a UNIX or WinNT system or a combination of these with equal ease. NEPM monitors and reports uptime, critical events such as intrusion attempts, access rates, bytes-transferred rates, and error rates of network nodes. Unique precursor event links drill down instantly to the causes of downtime, intrusion events, etc. Performance graphs highlight element throughput and error rate. Hardware and software sub-systems within nodes are tracked and reported separately but in a common format that makes possible direct comparison. True hardware uptime is reported so that hardware and software performance can be separated from that of the communications links and from each other. Summary reports and alerts aggregate a view of an entire network's status onto a single page. Reports are provided via web pages posted to a web server for instant access to results. E-mailed text alerts provide prompt notification of dangerous conditions. NEPM is managed via a browser interface, providing full local or remote control from anywhere on the network. Use NEPM to increase your network uptime, increase network security, monitor QOS and SLA's, and evaluate new equipment. Equipment monitored can be Windows or Linux/UNIX/FreeBSD servers, or any processor-based system that logs events to non-volatile storage and has a telnet/rlogin/ssh/IP stream-mode interface

MSN Protocol Analyzer
Added 2006-03-02
by Gordon Ahn
1. Overview MSNProtocol Analyzer(MSNPAnalyzer) is a network utility that can monitor (or capture, monitor) the sessions of MSN Protocol. If you use this program in conbination with SwitchSniffer program, you can capture and see all the MSNP sessions including conversations and MSN commands. >>>Benefits and Features: -. MSNPAnalyzer can monitor 2 NICs or more at once. -. MSNPAnalyzer can show MSN commands and the procedures of connection. -. MSNPAnalyzer enables you to see all the conversions on the network. -. If MSNPAnalyzer is used in conbination with SwitchSniffer program, You can capture all see all the MSN protocols and conversations. -. It is very easy to make MSNPAnalyzer to work. Just run MSNPAnalyzer on any computer on your network, and start to monitor. -. MSNPAnalyzer parses, decodes, analyzing MSN protocol in real-time. -. MSNPAnalyzer enables you to viewing the contents, commands and sessions of MSN protocol on-the-fly. >>> Who use it? [Developers] &#12288; want to see the MSN protocol including MSN commands to develope the products related to MSN. [Parents] &#12288; Want to know what their children are most concerned? [Company Managers] &#12288; Supervise your employees' chating at work, and conversation for reference later. 2. Getting Started 1) Install this program (MSN Protocol Analyzer). 2) Select Start->Programs->MSN Protocol Analyzer->MSN Protocol Analyzer 3) Just click "Start" button. 4) Looking at the main screen of MSNPAnalyzer.

Tufin SecureTrack
Added 2006-02-25
by
Tufin SecureTrack is a comprehensive auditing, monitoring and compliance solution for Firewall policies. SecureTrack's advanced change management and corporate policy enforcement capabilities mitigate risks associated with Firewall configuration changes, and enable compliance with the strictest regulations and standards. Real-time Monitoring SecureTrack continuously monitors Firewall policies, detecting and reporting any configuration change as soon as it is made. With Real-time monitoring, registered SecureTrack users receive detailed notifications on changes as they are made via email, SysLog and SNMP traps. SecureTrack analyzes the new configuration, and sends out detailed reports on the exact changes that were made, which administrator was responsible and which Firewalls were affected. Organizational Policy Compliance Organizational Policy Compliance enables effective tracking of Firewall policy changes for violations of the corporate policy, and dispatches real-time alerts as soon as such violations occur. In addition, SecureTrack can alert the Security Officer on suspicious and questionable policy changes. You can easily define what types of changes constitute breaches of your corporate policy. The Organizational Policy Compliance is configured through a rich set of audit rules, enabling a detailed policy specification. Graphical side-by-side comparison view SecureTrack provides you with a powerful side-by-side graphical view, highlighting the differences between any pair of policy versions. You can clearly identify which rules and objects were added, deleted or modified. Compliance with Regulations and Standards The past few years have been marked by a rise in government regulations and industry standards. SecureTrack improves security management procedures and processes, which are the fundamental requirements for IT security in the latest regulations and standards, including: > The Sarbanes-Oxley Act > The Basel Capital Accord (Basel II) > ISO 17799 / BS 7799 > HIPAA Increasing Uptime Network downtime is often caused by human error, especially when it comes to networking and security infrastructure. Keeping track of security policy changes will help you correlate network downtime with recent policy changes. The graphical comparison view enables quick identification of configuration errors, increasing your network uptime and delivering a high Return on Investment. Advanced Reporting SecureTrack's advanced reports complete the security management picture. You can use various criteria to query the policy revision database, and generate detailed custom reports. Advanced reports provide a complete accounting of security policy changes, detailing each Save and Install operation and its effects on the security policy. Reports can be scheduled to run periodically or triggered by specific policy change events, and support HTML, MHT or PDF formats. Advanced Rule Base Audit With the advent of SecureTrack, rule base auditing can now be highly automated to identify risks and vulnerabilities, remove un-used and expired rules, investigate historical rule changes and determine whether existing rules are configured according to the corporate policy. Rule Base Optimization SecureTrack monitors each Firewall's traffic logs and correlates the data in real-time with the rule base, to determine which rules were accessed at different points in time. This enables administrators to modify the rule base for optimal firewall performance, based on actual traffic. Enhanced Provisioning SecureTrack's user permissions can now be limited to specific Firewall Management servers or Provider-1 CMA's, enabling global policy monitoring and control for large enterprise customers and Managed Service Providers. Graphical policy view of historical revisions SecureTrack 2.2 enables a graphical view of the rule base and objects at any point in time, for increased visibility, error-correction and historical policy analysis. Full system backup and restore The product's entire database and configuration can backed up to a file and easily restored, for disaster recovery and easy platform migration.

SwitchSniffer
Added 2006-02-14
by Gordon Ahn
1. Overview SwitchSniffer is a program that can scan your switched LAN for up hosts and can reroute and collect all packets without the target users' recognition. It can also detect the ‘arpspoofer’ program running on the network and block user definable sessions like firewall. If you use this program in tandem with any sniffer program, you can capture and see the users’ IDs and passwords on a switched network. That is, SwitchSniffer enables you to monitor all the packets and all the hosts on a switch network. SwitchSniffer has the following features: -. SwitchSniffer can poll and collect all the packets on the switched LAN. -. SwitchSniffer can scan and display the active hosts on the LAN quickly, and automatically. -. While spoofing ARP tables, SwitchSniffer can act as another gateway (or ip-forwarder) without other users' recognition on the LAN.' -. It can collect and forward packets by selecting inbound, outbound, and both to be sent to the Internet. -. An ARP table is recovered automatically in about 30 seconds. But, SwitchSniffer can keep spoofing continuously by updating the target computer’s ARP table more frequently. -. If one or more network interface cards are installed on a computer, you can choose which NIC you would like SwitchSniffer to scan and spoof through. -. SwitchSniffer can display information about the amount of data transferred to and from the internet. -. SwitchSniffer can detect if any computer on the LAN is running an ‘arpspoofer’ program. -. SwitchSniffer can filter: sessions, local hosts, and remote hosts. -. The installation of the ‘winpcap’ driver is not necessary for SwitchSniffer. -. SwitchSniffer can manage the local hosts based on MAC Address. -. SwitchSniffer can act as a plug-and-played router. -. SwitchSniffer can export the data of view into an excel file. -. SwitchSniffer can cure arp-cache poisoning. SwitchSniffer has the following benefits: -. SwitchSniffer can make you use the network without blocking by arp-spoofer such as netcut, winarpspoofer and so on. -. SwitchSniffer can find the hidden hosts on the LAN, which is not found by IP-Scanners. -. SwitchSniffer can find if abnormal hosts are connected to your wireless network. -. SwitchSniffer protects your network from abnormal users. -. SwitchSniffer can check if there are abnormal packets on the LAN. -. SwitchSniffer allows you to capture user IDs, passwords, chat sessions and web sessions etc., on the switched network through the use of a sniffer application. -. SwitchSniffer can block the local hosts based on MAC Address. -. SwitchSniffer can resolve the problem of IP Collision. -. SwitchSniffer can find out the country name by ip address on remote. -. SwitchSniffer enables you to monitor all the packets on a switch network.

SysChk
Added 2006-01-21
by h0e
SysChk is a tool to aide in the monitor of file system integrity. This tool will ensure the integrity of files & directories is monitored for any changes. Monitored changes include: User Ownership. Group Ownership. File Permissions. Modified Time. Md5 Hash.

PBNJ
Added 2006-01-18
by Joshua D. Abraham
PBNJ is a network tool that can be used to give an overview of a machine or multiple machines which includes the details about the services running on them. PBNJ is different from other tools because it is based on using a scan from nmap parsed to amap. PBNJ parses the data from a scan and outputs to a CSV format file for each ip address scanned.

SwitchSniffer
Added 2006-01-01
by Gordon Ahn
1. Overview SwitchSniffer is a program that can scan your switched LAN for up hosts and can reroute and collect all packets without the target users' recognition. It can also detect the ‘arpspoofer’ program running on the network and block user definable sessions like firewall. If you use this program in tandem with any sniffer program, you can capture and see the users’ IDs and passwords on a switched network. >>> What's new: -. MAC Based Blocking. -. Converting the ip address into the country name. -. Export the view data into an excel file -. Coloring each row items. Employing the speed bars. Finding out the collision of ip addresses. >>> Features: -. SwitchSniffer can poll and collect all the packets on the switched LAN. -. SwitchSniffer can scan and display the active hosts on the LAN quickly, and automatically. -. While spoofing ARP tables, SwitchSniffer can act as another gateway (or ip-forwarder) without other users' recognition on the LAN.' -. It can collect and forward packets by selecting inbound, outbound, and both to be sent to the Internet. -. An ARP table is recovered automatically in about 30 seconds. But, SwitchSniffer can keep spoofing continuously by updating the target computer’s ARP table more frequently. -. If one or more network interface cards are installed on a computer, you can choose which NIC you would like SwitchSniffer to scan and spoof through. -. SwitchSniffer can display information about the amount of data transferred to and from the internet. -. SwitchSniffer can detect if any computer on the LAN is running an ‘arpspoofer’ program. -. SwitchSniffer can filter: sessions, local hosts, and remote hosts. The installation of the ‘winpcap’ driver is not necessary for SwitchSniffer. -. SwitchSniffer can manage the local hosts based on MAC Address. -. SwitchSniffer can act as a plug-and-played router. -. SwitchSniffer can export the data of view into an excel file. >>> Benefits: -. SwitchSniffer can find hidden hosts on the LAN. -. SwitchSniffer can find if abnormal hosts are connected to your wireless network. -. SwitchSniffer protects your network from abnormal users. -. SwitchSniffer can check if there are abnormal packets on the LAN. -. SwitchSniffer allows you to capture user IDs, passwords, chat sessions and web sessions etc., on the switched network through the use of a sniffer application. -. SwitchSniffer can block the local hosts based on MAC Address. -. SwitchSniffer can resolve the problem of IP Collision. -. SwitchSniffer can find out the contry name by ip address on remote. -. SwitchSniffer enables you to monitor all the packets on a switch network.

netdiscover
Added 2005-12-11
by Jaime Peñalba Estebanez
Netdiscover is an active/passive address reconnaissance tool, mainly developed for those wireless networks without dhcp server, when you are wardriving. It can be also used on hub/switched networks. Built on top of libnet and libpcap, it can passively detect online hosts, or search for them, by actively sending arp requests, it can also be used to inspect your network arp traffic, and find network addresses using auto scan mode, which will scan for common local networks.

Trojan Scan
Added 2005-11-30
by
Trojan scan is a simple shell script that allows for simple but relatively effective checking for trojans, rootkits and other malware that may be using your server and network for unwanted (and possibly illegal) purposes. It works by listing all processes that use the Internet with the lsof command (using -Pni flags). This list is then transformed into signatures. These signatures then are matched against the allowed process defined in the configuration. If any signatures of running processes are found that do not match the allowed signatures, an email report is sent including ps, ls, and optional lsof output.

e-Surveiller
Added 2005-10-16
by SurveilleTech, LLC.
e-Surveiller is a powerful user-activity monitoring, logging and surveillance suite. With it, you can record all keystrokes, Web site visits, windows, AOL, AIM, ICQ, MSN and Yahoo chats, etc. of computer users on standalone computers, on a local area network and on remote computers across the Internet. You view the screens of monitored users on a LAN or across the Internet in real-time! User-activity logs are also periodically uploaded or emailed to you for analysis + MORE!

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus