(Page 3 of 8)   < Prev  1 2 3 4 5 6 7 8  Next >

Category: System Security Management » Windows NT

DeviceLock
Added 2002-03-27
by SmartLine, Inc., devicelock@protect-me.com
DeviceLock gives network administrators control over which users can access what devices (ports, floppies, Magneto-Optical disks, etc.) on a local computer. Once DeviceLock is installed, administrators can assign permissions to LPT ports, CD-ROMs, COM ports or any other device, just as they would to share-permissions on a hard disk. Network administrators can use DeviceLock to flush a storage device's buffers (very useful for removable media) and to get extended information about devices and NTFS partitions. Remote control is also available.

DelGuest
Added 2002-03-27
by Arne Vidstrom, arne.vidstrom@ntsecurity.nu
DelGuest deletes the built-in Guest account in Windows NT. This account is supposed to be impossible to delete, and it is impossible to delete through the ordinary user interface, but with DelGuest you can do it.

userinfo
Added 2001-12-07
by Michael Vogt
The purpose of this app is to illustrate inconsistencies in the MS implementation of the RestrictAnonymous registry setting.

WinARP Watch
Added 2001-12-06
by Andreas Vernersson
WinARP Watch is a program that monitors Windows ARP cache. The ARP cache contains IP/MAC translations so that every time an IP packet are to be sent, the MAC address doesn't have to queried through a broadcast, instead it uses the cached address. The problem with this is that someone can send faked ARP responses, which gets stored in the cache too. Which is called ARP poisoning and that is no good for you. So this program watches the cache and stores every new IP/MAC combination to it's own lists. If a combination is already known, the program compares it with the cache to see if has changed.

Userinfo MultiThread
Added 2001-11-28
by michael vogt
userinfo, scan netbios informations (accounts, bf password check, scan c-subnets etc..)

CIA Commander
Added 2001-11-22
by Datapol GmbH
CIA Commander gains full access to a NT/Win2000 Partition (NTFS). The setup makes a bootable diskette. You have graphical access to the user manager, the registry and the file system.

AccountPolicy
Added 2001-10-22
by Darren Tucker
Allows setting of NT's User Account Policy of the local machine from the command line. It is almost functionally equivalent to the "Policy->Account" Menu in the User Manager tool, but is operated from the command line. It can set maximum and minimum password age, minimum password length, password history size, number of login attempts and time between them allowed before lockout, and the length that accounts are locked out. It can be used by domain logon scripts, at jobs, lockdown scripts and the like.

Net Tools
Added 2001-10-22
by Mikersoft
Net Tools 2001 can: - scan any class A, B or C network for any list of open ports. - Network Scanner takes advantage of multi-threading. - You can use many threads to scan at the same time for quick results. - You can save your port list to a text file. - You can also save your list of found connections to a text file. - Port Scanner can scan any computer for a list, or range of open ports. - Set your speed of finding open ports by setting the timeout variable. - Windows graphical ping utility allows you to change the size of the packets, the timeout, and the number of packets to ping. - Windows graphical DNS Utility shows you extended information on a given hostname or IP address. - Windows graphical utility for connecting to an open port and testing commands. - Works like a telnet client but you can send 1 line at a time. - Windows graphical Whois client where you can configure the whois server for multiple DNS name types.

userdump
Added 2001-10-22
by
The purpose of this app is to illustrate inconsistencies in the MS implementation of the RestrictAnonymous registry setting.

DoorWatch
Added 2001-10-22
by corea2k
IP/PORT/NetBios/Trojan Scanning, Whois Ping, Test Ping, Attack NetStatus, Whois NSLookup Finger

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus