(Page 4 of 84)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >

Category: Utilities

syslog-ng Premium Edition
Added 2007-08-10
by BalaBit IT Security
The syslog-ng Premium Edition application is a system logging client and server application that offers native TCP and TLS support, disk buffering, and logging directly into SQL databases. It runs on a variety of UNIX-like systems, and can also collect logs from Microsoft Windows platforms.

Bopup Observer
Added 2007-07-08
by B Labs
Secure one-way instant messenger designed to receive messages over LAN, enterprise-size networks and Internet. This clear, easy to use and light-weight client is a quick and efficient solution for alerting and urgent messaging purposes. The messenger is based on a fully managed client/server platform which provides full IM logging, user grouping, offline and scheduled messaging. Bopup Observer fully supports Terminal Server/Citrix environment.

Bopup Messenger
Added 2007-07-08
by B Labs
Secure instant messenger designed to communicate over LAN and enterprise-size networks. This clear, easy to use and light-weight IM client offers a set of corporate features and answers most of the business needs you may have. The messenger is based on a fully managed client/server platform which provides full IM logging, user grouping, offline and scheduled news messaging. Bopup Messenger fully supports Terminal Server/Citrix environment.

Bopup Communication Server
Added 2007-07-08
by B Labs
This instant messaging server designed for organizing effective communication system over small and enterprise-size networks. The server is fast to deploy and easy to use, it offers a set of corporate features and answers most of the business needs you may have. You can easily unite users from all other offices and locations to one secure IM workspace and take control over that system. Features include IM logging, user grouping, printing support.

SpyStudio
Added 2007-05-02
by Hernan Gonzalez, Rodrigo Perez Varas
SpyStudio is an application to monitor API calls made by different processes. It simplifies the code execution interception operations to really know what is happening in the Windows Operating System's processes and in its applications.

Simply Password Manager
Added 2007-05-02
by
Despite of the site gfx and very basic implemented functionality this tool seems very useful. The innovative idea is that password never exists on your PC. They are generated on the fly when you need and then destroyed.

Training in a Flash Malware Protection
Added 2007-04-18
by Guy Huntington
A free, 3 minute Flash Program to train enterprise users on malware attacks and how to avoid them.

Secret Server
Added 2007-04-09
by Thycotic Software
Secret Server is a password management system designed for colleagues in enterprises to securely store and share secrets. Secrets include but are not limited to: passwords, bank account information, product license keys, etc.

Aurora Password Manager
Added 2007-04-08
by Animabilis Software
Aurora Password Manager is a full-featured password storage and management solution. This software will store your sensitive data such as website and e-mail passwords, credit card account data, cellular phone PIN codes, etc. in a secure database. The database is encrypted with a 256-bit Advanced Encryption Algorithm, a standard adopted by the U.S. Department of Defense that would take at least 500 years to crack. To increase security even more, the password database can be stored on removable media (such as a USB flash drive) and connected to the computer only when needed. To make sure that you always use the most secure passwords possible, Aurora Password Manager will generate passwords as needed. A number of predefined templates, including web-form, e-mail account, credit card and others, will help you to easily add passwords to the database. The Find function will enable you to find the password you need quickly, even if there are thousands of passwords in the database. Aurora Password Manager is shipped with an IE toolbar plug-in that greatly simplifies filling web forms that contain passwords or any other data by storing the information and entering it automatically when necessary. Aurora Password Manager is ideal for both corporate and individual use: the program supports multiple users and allows them to access the password file simultaneously. In fact, the password file is a full-featured database that supports SQL, tables and locking. In addition, the program features a completely configurable interface and several visual styles. Aurora Password Manager supports all Windows versions starting with Windows 98, and can be downloaded absolutely free.

ZippyLock
Added 2007-03-29
by Ergun Çoruh
ZippyLock is a free and extremely easy to use password management utility. Your password entries are kept in a 'private file' and nowhere else. ZippyLock uses Windows clipboard to transfer your data into forms (see the Demo at web site). When you run ZippyLock for the first time, it prompts you to create a new private file, and asks you to specify a MASTER PASSWORD. Later you will be prompted to save your private file. The private file will be stored on your hard-disk (or a USB Disk). The private file will be Triple-DES encrypted using a unique hash number generated from your MASTER PASSWORD. The hash number too will be encrypted by itself and stored in the same private file along with your encrypted passwords. Note that your MASTER PASSWORD is not stored anywhere. Your encrypted passwords are not stored anywhere other than the private file. No other auxiliary or reference information is kept in hidden places like registry, WINDOWS directory etc. Everything is stored in your private file that you control and nowhere else. In general TDES with three different keys (3TDES) has a key length of 168 bits: three 56-bit DES keys (with parity bits 3TDES has the total storage length of 192 bits), but due to the meet-in-the-middle attack the effective security it provides is only 112 bits. As of 2005, the best attack known on 3TDES requires around 232 known plaintexts, 2113 steps, 290 single DES encryptions, and 288 memory. This is not currently practical.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus