(Page 4 of 89)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >

Platform: Windows NT

WinPassword
Added 2006-11-22
by Vitas Ramanchauskas
WinPassword (formerly known as NT Password) is an application for NT / 2000 / XP / 2003 system administrators for finding breaches in system security. It tries to recover plain-text passwords analyzing user password hashes. If it is possible to recover a password within reasonable time, the password should be considered insecure. WinPassword also can be used to recover lost passwords of particular users. Please note that this program is for advanced users and system administrators with good understanding of NT security model. WinPassword uses both traditional recovery methods (Brute Force Attack, Dictionary Search) and the Smart Table Recovery (TM) technique (based on "Rainbow Tables"), allows recovering long and complex passwords quickly: 7 characters password (all characters) can be recovered in 40 minutes (using Brute Force Attack the password can be recovered in 29 days).

ADManager Plus
Added 2006-11-14
by AdventNet
ManageEngine ADManager Plus is a 100% web-based product that simplifies enterprise-wide Windows Active Directory management from a central point. The ADManager Plus, with its ease-of-use, intuitive UI, eliminates the need of using command line tools and scripts to manage the Active Directory. It saves the administrator's time with its integrated management and reporting module.

RiskProfile Tool
Added 2006-10-31
by Perimeter Internetworking
A uniquely powerful self-assessment and security planning tool for financial services institutions by Perimeter Internetworking, the only provider of complete e-security on demand. In a twenty-minute online session, the powerful RiskProfileTM system helps IT and technology executives align security plans and spending with the business risks of their institutions, and provides valuable data benchmarking the user’s results against other institutions.

SafePasswd
Added 2006-10-15
by Robert Accettura
Generate safe, secure and memorable passwords quickly and easily. If a password isn't memorable it isn't used. Also visually displays how effective a password is.

UserLock
Added 2006-09-29
by IS Decisions
UserLock secures access to Windows networks by controlling the amount of simultaneous sessions and by limiting network access per user or group. With UserLock, a network administrator can implement and enforce efficient restriction and access policies for Windows NT/2000/XP/2003 networks (LAN and WAN), and monitor and manage all sessions in real time: receive alerts, remotely disconnect or lock a user session and automatically log activity and generate precise session reports and statistics.

SecurWall
Added 2006-09-18
by SecurStar
SecurWall is a personal desktop firewall designed to protect computers against malicious attacks, port scanning, viruses and other malicious software entities, making your PC invisible on the Internet and making your IP anonimous when surfing.

ShareCrypt
Added 2006-09-18
by SecurStar
ShareCrypt has been designed to effectively and transparently encrypt shared network drives or folders by allowing simultaneous data access to different users and preventing unauthorized access from non-authorized people

Drive Crypt
Added 2006-09-18
by SecurStar
1344 Bit, Military strong, transparent Hard Disk encryption. DRIVECRYPT securely and easily protects all proprietary data on notebooks and desktop computers 100% of the time. It can also hide your date into music files.

Drive Crypt Plus Pack
Added 2006-09-18
by SecurStar
Offers AES 256 bit, full disk encryption and pre-boot authentication. Able to protect the entire computer including the operating system, in real time. Only softwar able to hide the entire operating systemDCPP also works with external USB-Token.

N-Stalker Web Application Security Scanner 2006
Added 2006-09-13
by N-Stalker
N-Stalker Free Edition allows for quick security assessment of Web Applications under the perspective of Infrastructure and Deployment phases. It scans for more than 18,000 vulnerabilities, crawl your web application, discover hidden directories/files and look for backup files.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus