(Page 3 of 62)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >

Category: Network Utilities

PandoraFMS
Added 2008-09-23
by Sancho Lerena
Pandora FMS is monitoring software. It can detect a network interface down, a defacement in your website, a memory leak in one of your server application, or the movement of any value of the NASDAQ new technology market. Pandora FMS can send SMS messages when your systems fails... or when Google's value drop below US$ 500. Pandora FMS can monitor Windows remotely (through WMI), any device via TCP and/or ICMP checks, and any SNMP device through polling and trap reception. Also allows to reuse user-defined "plugins" that make remote checks, like execute remote commands, connecting devices by telnet to gather data, etc. Pandora FMS can perform periodical network reconnissances to discover new hosts and devices on the network and can create a visual network map, with its network topology and OS type. Pandora FMS also has an WYSIWYG AJAX Visual Console editor for interactive map creation; It has also advanced features like data replication across multiple Pandora FMS setups, pattern-anomaly detection, a prediction engine, a event notificacion manager and a correlation alert system. Besides agentless monitoring it has software agents that can be installed in most OS on the market, these agents can be remotely configured from the Console, and are able to process logs from Windows and Unix systems. Reporting features include user defined reports: SLA checks, real time graphs, and much more possibilities thanks to its SQL automanaged backend. Link & Other data:

OSSEC HIDS
Added 2008-08-29
by Third Brigade
OSSEC is an Open Source Host-based Intrusion Detection System. It performs log analysis, integrity checking, Windows registry monitoring, rootkit detection, real-time alerting and active response. It runs on most operating systems, including Linux, OpenBSD, FreeBSD, MacOS, Solaris and Windows.

Switch Center
Added 2008-08-22
by Lan-Secure.com
Switch Center is network management software for managed network switches and hubs from any vendor supporting SNMP BRIDGE-MIB that helps to discover, monitor and analyze networks connectivity and performance. Switch Center key features are: real-time network discovery, nodes and users information, network switch ports mapping, connectivity and performance monitoring and built-in reports and statistics.

DAVIX
Added 2008-08-17
by Jan P. Monsch, Raffael Marty
DAVIX - the Data Analysis & Visualization Linux® - brings the most important tools for data processing and visualization to your desk. This solution allows you to get started with security visualization without cumbersome compiling and installing tools. The DAVIX CD is based on SLAX 6.0 and follows a modularized approach. Thus, the SLAX ISO image can easily be customized for various purposes. It can even be installed on USB sticks and provide you with mobile analysis capabilities. The CD is shipped with a comprehensive manual that gives you a quick start for all tools and provides information on how-to tailor DAVIX to your needs. All tools are accessible through the KDE start menu and are accompanied with links to external manuals and tutorials.

Teamviewer
Added 2007-05-21
by TeamViewer GmbH
TeamViewer is a simple and fast solution for remote control, desktop sharing and file transfer that works behind any firewall and NAT proxy. To connect to another computer just run TeamViewer on both machines without the need of an installation procedure. With the first start automatic partner IDs are generated on both computers. Enter your partner's ID into TeamViewer and the connection is established immediately. With many thousand users worldwide TeamViewer is a standard tool to give support and assistance to people in remote locations. The software can also be used for presentations, where you can show your own desktop to a partner. TeamViewer also is VNC compatible and offers secure, encrypted data transfer with maximum security.

Training in a Flash Malware Protection
Added 2007-04-18
by Guy Huntington
A free, 3 minute Flash Program to train enterprise users on malware attacks and how to avoid them.

Site Notifier
Added 2007-03-06
by James Putneney
Site Notifier is the perfect website monitoring tool for the busy executive, marketing manager or entrepreneur; anyone really who is responsible for one or more websites but doesn't have the time to continuously check to see if a site is up throughout the day.

S.I.T.H. 2048bit Secure Client
Added 2007-01-25
by
PROTEXX (SITH) Secure Wireless Secure Information Technology Highway (SITH)™ is next generation wireless technology, developed by PROTEXX, that provides enhanced levels of security and greater user authentication to eliminates the ability of anyone from monitoring your Internet activity or stealing your personal or corporate data.The Secure Information Technology Highway™ ensures that server, client and remote communications are done with a secured environment with more than 10X the security level by today's standards.

Scuba by Imperva
Added 2007-01-05
by Imperva
Scuba by Imperva is a free, lightweight Java tool that scans Oracle, DB2, MS-SQL, and Sybase databases for hundreds of software vulnerabilities. It also detects configuration flaws like insecure passwords, unsafe processes, unrestricted permission levels, and more. Furthermore, it generates HTML and Java reports that show overall security risk level and detailed information about each vulnerability – so you can pinpoint configuration risks within minutes. Scuba by Imperva detects hundreds of database vulnerabilities and configuration issues. And better yet – it helps you meet industry-leading best practices standards for database configuration and management.

Technitium MAC Address Changer v4
Added 2006-12-19
by Shreyas Zare
Technitium MAC Address Changer allows you to change Machine Access Control (MAC) Address of your Network Interface Card (NIC) irrespective to your NIC manufacturer or its driver. It has a very simple user interface and provides ample of information regarding each NIC in the machine. Every NIC has an MAC address hard coded in its circuit by its manufacturer. This hard coded MAC address is used by windows drivers to access Ethernet Networks (LAN). This tool can set a new MAC address to your NIC, bypassing the original hard coded MAC address. Technitium MAC Address Changer is a must tool in every security professionals tool box. Technitium MAC Address Changer v4.0 is coded in Visual Basic 6.0.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus