(Page 3 of 31)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >

Category: Network Utilities » Monitoring

UserLock
Added 2006-09-29
by IS Decisions
UserLock secures access to Windows networks by controlling the amount of simultaneous sessions and by limiting network access per user or group. With UserLock, a network administrator can implement and enforce efficient restriction and access policies for Windows NT/2000/XP/2003 networks (LAN and WAN), and monitor and manage all sessions in real time: receive alerts, remotely disconnect or lock a user session and automatically log activity and generate precise session reports and statistics.

Colasoft Capsa professional
Added 2006-09-07
by Colasoft Co., Ltd
Expert packets sniffer designed for packet decoding and network diagnosis, Colasoft Capsa monitors the network traffic transmitted over a local host and a local network

Colasoft Capsa Enterprise
Added 2006-09-07
by Colasoft Co., Ltd
Expert packets sniffer designed for packet decoding and network diagnosis, Colasoft Capsa monitors the network traffic transmitted over a local host and a local network

SwitchSnarf
Added 2006-08-26
by Ekrem ORAL
SwithSnarf enables monitoring the internet connection of any computer in a network established with a switch. SwitchSnarf scans all working computers in the local network and identifies their MAC addresses, IP addresses and Computer Names (Hostnames). The internet in/out going internet connections of a computer can be monitored in cooperation with any network monitoring programme (sniffer) or the Nexeye Monitoring Enterprise. No changes are required in the network setup and no additional software is needed on the computer that is monitored. Technical Structure: In a local network established with a switch, the packages are sent to the relevant computer only. SwitchSnarf utilises ARP packages that are used for identifying the computer details. By capturing the ARP packages that are sent to the gateway, SwitchSnarf monitors the network traffic.

Nexeye Monitoring Enterprise
Added 2006-08-04
by Ekrem ORAL
How efficient is your internet connection being utilised? Does your network users utilising the internet to the purpose of your organisation? Which web sites are your users browsing? Do you have a control of the content of the e-mails sent from your network? What kind of e-mails are received by whom in your network? Is MSN Messenger used in your network? For what purpose? Monitor network activities Monitor network users web, e-mail and MSN Messenger activities on a real-time basis with nexeye Monitoring. Monitor network utilisation Monitor on a real-time basis the network traffic from/to the Internet as well as the traffic generated by the individual users. Analyse and report the network data Analyse the logged data and create professional reports with the report templates. Transform the huge amount of network information to reports that make sense. nexeye measures and displays the amount of traffic from the LAN to internet and from internet to the LAN. With the statistical information provided by this function, the user is provided valuable information of how effectively and efficiently the network is utilised. With this information the band-with of the network can be planned and optimised. The statistical information can be organised and displayed by hours of the day, days of the week or by months. Web connections from the LAN to the internet can be monitored real-time by each individual user. nexeye can be pre-configured to monitor and log specific types of url/mime, whereby only “critical” web connections may be monitored. This monitoring is performed independent of the program that has initiated the connection. nexeye monitors and logs e-mails from and to users in real-time. The logs can be sorted and grouped by “from”, “to”, “subject” or “date”. All in- and outgoing e-mails are recorded in EML format on the disk and can be viewed with a standard e-mail programme such as Outlook Express.

Log 2 Google Earth
Added 2006-07-26
by Bytesman
Visualize any logfile (firewall / apache you name it) in near realtime on Google Earth. See where you traffic is coming and going to.

MultiPing Grapher
Added 2006-07-14
by Carsten Schmidt
MultiPing Grapher is a further development of Perfping with the ability to graph up to 10 different ICMP results. Includes logging and average calculation. Version 1.3.0; released June 2006 Freeware (279,951 Bytes)

XRatel Perfmon Tools
Added 2006-07-10
by XRatel Software
XR PerfMon Tools remotely monitors MS Windows computers using WMI technology, providing valuable information for system administrators to optimize the efficiency and setup of servers and workstations. XR PerfMon Tools can get from a computer more than 1 million different variables, including hardware and running software information, and can also calculate the “Computer Health” variable. An OPC server is available in other license options.

OmniPeek Personal
Added 2006-06-21
by WildPackets, Inc.
OmniPeek Personal is a free version of the commercial protocol analyzer AiroPeek and EtherPeek, with support for both wired and wireless (802.11) traffic. Additional plug-ins may also be downloaded, such as: a Google Maps plugin which plots the location of an IP in Google Maps, a SQLite plug-in which can store packets in SQLite files so they can be searched with SQL queries, and a Remote TCPDump plug-in which can securely (SSH) connect to any Unix or Linux computer (e.g. Check Point's FireWall-1) and stream the packets back into OmniPeek for analysis -- all with out having to install any software on the remote end.

Open Leak Prevention Test Tool
Added 2006-06-15
by Sharon Besser
The Open Leak Prevention Test Tool is an open source, freely distributed tool and methodology that were developed and maintained by PortAuthority Technologies Inc in order to measure the accuracy, effectiveness and detection capabilities of content filtering technologies used by Information Leak Prevention and Content Monitoring and Filtering products to prevent information leaks and ensure corporate and regulatory compliance.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus