(Page 3 of 5)   < Prev  1 2 3 4 5  Next >

Category: Access Control » File System

Hark!
Added 2001-10-22
by Camelot
Hark! is the world's first automated intelligent access control solution. Powered by Camelot's Network Intelligence technology, Hark! utilizes advanced discovery algorithms to analyze network events and deduce the functional structure of an organization, extracting and mapping the relationships between users and various network resources.

VisualSoft FileSecure
Added 2001-10-22
by VisualSoft Technologies
VisualSoft FileSecure 1.0 is a cute cryptographic product that helps encrypt/decrypt files and/or folders using symmetric key mechanism. It incorporates powerful Blowfish algorithm for the process of encryption and decryption. It supports file compression and secure file transfer using FTP. It encrypts selected files and/or folders and produces a self-decryption archive. The encrypted file can be decrypted simply by double clicking the archive with the given passphrase.

X LineControl Client
Added 2001-10-22
by S. Fuchs
LineControl Clients allow you to remotely control the lines (e.g., internet connections) of a server running LineControl Server. xlc (X LineControl Client) supports controlling of multiple lines/automatic hangup, and has a small floating window displaying throughput information.

Silent Operating System Detector
Added 2001-10-22
by Laboratoire Systeme de l'EPITA
Silent Operating System Detector might be able to recognize operating systems through network traffic by passively examing packet specifics.

PC Lock 98
Added 2001-10-22
by Software.pair.com
PC Lock 98 lets you take control of the security features of Windows 95/98 that are not easily implemented through Windows itself. Disable access from modifying the systems configuration. Create multiple account allowing different system users various levels of access. Ideal for computer systems in an open area with public use. Schools, libraries, churches, businesses, and even parents can control the access level granted to users. PC Lock 98 help protect your system configuration eliminating the need to continually re-configure your system to your preferences. 30-day free trial period to evaluation the full functionality of PC Lock 98 included.

PC Security
Added 2001-10-22
by Silvio Kuczynsk
The PC Security for Windows offers Explorer Control, File Lock, System Lock, Shortcut/Program Lock, Restricted System, Window Lock, Intruder Detection with Alarm, Flexible and complete password protection, and Drag and Drop support.

TimeWatcher
Added 2001-10-22
by Philipp Hoffmann
TimeWatcher was designed to control your computer's access in two ways: you can determine the period of time during which someone can use the computer and prevent further usage; and you can control which programs can be used.

Watchman
Added 2001-10-22
by Anfibia
Watchman is a fast, simple, easy, inexpensive but effective security application that would probably be the kind of tool you are looking for to stop your kids from using a given program, or from changing your Windows' configuration. In addition, Watchman has proven to be a very interesting and effective tool for businesses or institutions that need to stop users/workers/students from wasting their time or from accessing to forbidden data.

Access Sentinel
Added 2001-10-22
by Sentinel@XProc.com
Protect your Win95/98 files and folders with this kernel-mode operating system security extension. Tightly integrated with the Windows Shell, Sentinel allows you to hide, monitor, and block access to files and folders using nothing more than the Windows Explorer File Properties dialog. Also allows you to watch in realtime all activity on your harddrive. Designed for ease-of-use and minimal fuss.

HookProtect
Added 2001-10-22
by ANNA Ltd., pcihprot@anna.zaporizhzhe.ua
HookProtect version 2.05 is an another powerful product of PCinvestigator series. It is specialized on detecting the programs that infringe the privacy and confidentiality on personal computers. There are many various types of such programs: keyloggers, interceptors, spies, Trojans and so on. Their main function is monitoring of some kind of user's activity on a computer (for example, typing the text, running the applications, opening the windows, Internet activity, etc.). If your computer is connected to Internet/intranet or it is accessed by many people, there is a probability that someone can install remotely or locally some kind of logger or monitoring program on it. And you have no way to notice it because most of them run invisibly. All existing processes and modules viewers cannot detect the professional logger (for example, SKIn98). But using HookProtect you can immediately ascertain whether your computer is "under observation" or it is not. The HookProtect main features are: - detection of loggers and monitoring programs loaded in memory; - discovery of loggers and monitoring programs located on hard drive but not loaded in memory by using special technology of heuristic analysis; - listing of all loaded modules and opened files; - monitoring of files activity (files and directories creations, deletions, renames, changes in attributes, size and time - all by user's choice) on selected directory; - detailed information in log file; - Windows 95/98 and Windows NT Workstation 4.0 support; - Y2K compliance. HookProtect is intended for persons responsible for computer security, for system administrators and programmers, systeminternals specialists and others who want to feel safe while working with confidential information on their PC.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus