(Page 5 of 89)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >

Platform: Windows NT

JAAScois PC Monitor v1.0
Added 2006-09-10
by JAAScois
» Protecting system and windows startup » Protecting internet explorer from hijacks & spyware » Preventing access to computer settings » Internet filtering for web sites , chat rooms and e-mail

MSN Password Recovery
Added 2006-09-07
by Reactive Software
MSN Messenger Password Recovery is the MSN password finder that instantly cracks and decrypts the MSN Messenger and Windows Messenger passwords stored on your computer. New version adds support for latest Windows Live Messeger (version 8).

Softros LAN Messenger
Added 2006-09-07
by Softros Systems, Inc.
Softros LAN Messenger is an easy-to-use, serverless LAN messaging application for effective intra-office communication. Features include: - Message notification alarms - Personal or group messaging - File transfers - Encryption options - Message logs - Microsoft/Citrix Terminal Services support

MDCrack
Added 2006-09-07
by Gregory Duchemin
MDCrack is a free featureful password cracker designed to bruteforce several commonly used hash algorithms at a very aggressive speed rate. It can retrieve any password made of up to 8 characters (16 for PIX algorithms) and 55 characters when salted. In order to achieve the highest possible speed rate, this program uses several cores for each algorithm it supports. Each one of these cores provides a different level of optimization designed to best fit with a specific set of command line options. Whatever command line configuration is used, MDCrack will always arrange to use the best available core. To date, this program supports bruteforce attacks on MD2, MD4, MD5, NTLMv1 and PIX (enable and users) hashes, the list of algorithms is growing up. Multi threading allows for parallel cracking and load sharing between several CPUs and multiplies overall speed by the number of available processor(s). This yields to phenomenal performance even on old generation multi-CPUs systems. Several options offer fine tuning for the attack and allow to save and resume your session at a later time. This program has multiple uses in real life, while its primary goal is obviously to test the strength of hashed passwords, it can also be used as a raw benchmark tool for integer calculs. For any question you may have, please be sure to first read the Frequenty Ask Questions file (FAQ) provided in MDCrack ZIP file. I hope you will enjoy this program.

Collapse Web Application Scanner
Added 2006-09-05
by Syhunt Security Team
Collapse, a free tool from Syhunt, allows web administrators to perform aggressive and comprehensive scans of an organization's web server to isolate vulnerabilities and identify security holes. The Collapse scanner requires basic inputs such as host names and port numbers to scan a complete web site and test all the web applications for security vulnerabilities. This new version includes an improved GUI, new web application security checks and many other additional enhancements.

SQL Password
Added 2006-09-04
by Vitas Ramanchauskas
SQL Password is a password recovery tool for Microsoft SQL Server that can recover password for registered user accounts. The following versions of MS SQL Server are supported: 2000, 2005, 2005 Express as well as Microsoft SQL Server Desktop Engine (MSDE) 2000. Because of the nature of the security system used in MS SQL Server, you have two options when recovering lost or forgotten passwords: 1) you can try to recover the original password. MS SQL Server encrypts passwords and they cannot be easily decrypted, so SQL Password uses the following recovery methods to crack them: Brute Force Attack, Dictionary Attack and Smart Force Attack. Although there is a guarantee that the password will be recovered, it may take a long time. So, in most cases (i.e. an administrator who has forgotten his or her password) the best option is the second one: 2) you can reset the password to a known one. SQL Password performs this operation instantly by modifying the master.mdf file where SQL Server stores passwords. If you use this feature, you do not have to wait until the password is cracked, though the original password remains unknown. This change is transparent and you may continue to work with the database as usual, using the new password to log on. You can use SQL Password to recover or reset any password found in the user accounts file of MS SQL Server, including the password for the system administrator (whose username is "sa"). Like every other our password recovery tool, SQL Password is efficient, reliable and easy-to-use. We constantly update it to support the latest versions of MS SQL Server. The latest version supported at the moment is 2005. Please check our website for updates and more information. Note: if SQL Server is configured to use the standard Windows security accounts ("Windows authentication mode"), SQL Password will not be able to recover passwords.

WinPT - Windows Privacy Tray
Added 2006-08-18
by Timo Schulz
WinPT is a taskbar front-end for GnuPG which includes key management, encryption via the clipboard, direct file encryption and support for OpenPGP smartcards.

CryptoSearch
Added 2006-08-08
by Password Crackers, Inc.


Engage Packet builder
Added 2006-08-06
by G. Wilmes
A powerfull and scriptable packet Builder, being useful to build parsonalized packet with the aim of testing the security of your firewall, network, etc... (TCP, IP, UDP, ICMP)

Nexeye Monitoring Enterprise
Added 2006-08-04
by Ekrem ORAL
How efficient is your internet connection being utilised? Does your network users utilising the internet to the purpose of your organisation? Which web sites are your users browsing? Do you have a control of the content of the e-mails sent from your network? What kind of e-mails are received by whom in your network? Is MSN Messenger used in your network? For what purpose? Monitor network activities Monitor network users web, e-mail and MSN Messenger activities on a real-time basis with nexeye Monitoring. Monitor network utilisation Monitor on a real-time basis the network traffic from/to the Internet as well as the traffic generated by the individual users. Analyse and report the network data Analyse the logged data and create professional reports with the report templates. Transform the huge amount of network information to reports that make sense. nexeye measures and displays the amount of traffic from the LAN to internet and from internet to the LAN. With the statistical information provided by this function, the user is provided valuable information of how effectively and efficiently the network is utilised. With this information the band-with of the network can be planned and optimised. The statistical information can be organised and displayed by hours of the day, days of the week or by months. Web connections from the LAN to the internet can be monitored real-time by each individual user. nexeye can be pre-configured to monitor and log specific types of url/mime, whereby only “critical” web connections may be monitored. This monitoring is performed independent of the program that has initiated the connection. nexeye monitors and logs e-mails from and to users in real-time. The logs can be sorted and grouped by “from”, “to”, “subject” or “date”. All in- and outgoing e-mails are recorded in EML format on the disk and can be viewed with a standard e-mail programme such as Outlook Express.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus