(Page 5 of 62)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >

Category: Network Utilities

halberd
Added 2006-08-17
by Juan M. Bello Rivas
halberd discovers HTTP load balancers. It is useful for testing load balancer configurations and for web application auditing purposes.

OpenNAC
Added 2006-08-08
by S.Boran
OpenNAC provides easy to use VLAN assignment and LAN access control for Cisco Switches and all kind of network devices (Servers, Workstations, Printers, IP-Phones, Webcams...) OpenNAC can be considered as having to phases. We have taken OpenVMPS, added a MySQL back end, a Delphi GUI, some advanced PHP control scripts, scalability, redundancy, alerting and more. This has been installed at companies with networks sizing from one hundred to 2000 machines. We will continue to market this product and offer professional support. Next, we want to make OpenNAC available to the OpenSource community. We are currently working through the existing code to remove or replace all proprietary pieces and on new database scheme to allow further extensions. We are also considering adding 802.1x support (provides better security and is not limited to Cisco switches) and moving the Delphi GUI to a web based user interface. The 'plan' is for the project to move forward to eventually become THE OpenSource Enterprise tool for dynamic VLAN assignment and network authentication. So, we wish to solicite community opinions, expertise and feedback. Are you interested in this tool, would you like to use it or even like to contribute to it (documentation, support, development, promotion, architecture, review...)? Please visit us on www.OpenNAC.net !

CryptoSearch
Added 2006-08-08
by Password Crackers, Inc.


Engage Packet builder
Added 2006-08-06
by G. Wilmes
A powerfull and scriptable packet Builder, being useful to build parsonalized packet with the aim of testing the security of your firewall, network, etc... (TCP, IP, UDP, ICMP)

Nexeye Monitoring Enterprise
Added 2006-08-04
by Ekrem ORAL
How efficient is your internet connection being utilised? Does your network users utilising the internet to the purpose of your organisation? Which web sites are your users browsing? Do you have a control of the content of the e-mails sent from your network? What kind of e-mails are received by whom in your network? Is MSN Messenger used in your network? For what purpose? Monitor network activities Monitor network users web, e-mail and MSN Messenger activities on a real-time basis with nexeye Monitoring. Monitor network utilisation Monitor on a real-time basis the network traffic from/to the Internet as well as the traffic generated by the individual users. Analyse and report the network data Analyse the logged data and create professional reports with the report templates. Transform the huge amount of network information to reports that make sense. nexeye measures and displays the amount of traffic from the LAN to internet and from internet to the LAN. With the statistical information provided by this function, the user is provided valuable information of how effectively and efficiently the network is utilised. With this information the band-with of the network can be planned and optimised. The statistical information can be organised and displayed by hours of the day, days of the week or by months. Web connections from the LAN to the internet can be monitored real-time by each individual user. nexeye can be pre-configured to monitor and log specific types of url/mime, whereby only “critical” web connections may be monitored. This monitoring is performed independent of the program that has initiated the connection. nexeye monitors and logs e-mails from and to users in real-time. The logs can be sorted and grouped by “from”, “to”, “subject” or “date”. All in- and outgoing e-mails are recorded in EML format on the disk and can be viewed with a standard e-mail programme such as Outlook Express.

Log 2 Google Earth
Added 2006-07-26
by Bytesman
Visualize any logfile (firewall / apache you name it) in near realtime on Google Earth. See where you traffic is coming and going to.

Chorizo!
Added 2006-07-18
by Mayflower GmbH
Chorizo! is a web app security scanner especially for PHP based applications. It's an application service (all data encrypted on the server, no one can see the results except the users) that is able to detect SQL injections, AJAX bugs, code inclusions/executions, session fixations, PHP vulnerabilities and so on. It will also be available as an appliance version for testing non-public websites.

MultiPing Grapher
Added 2006-07-14
by Carsten Schmidt
MultiPing Grapher is a further development of Perfping with the ability to graph up to 10 different ICMP results. Includes logging and average calculation. Version 1.3.0; released June 2006 Freeware (279,951 Bytes)

XRatel Perfmon Tools
Added 2006-07-10
by XRatel Software
XR PerfMon Tools remotely monitors MS Windows computers using WMI technology, providing valuable information for system administrators to optimize the efficiency and setup of servers and workstations. XR PerfMon Tools can get from a computer more than 1 million different variables, including hardware and running software information, and can also calculate the “Computer Health” variable. An OPC server is available in other license options.

MAC Address Changer
Added 2006-07-03
by Shreyas Zare
Technitium MAC Address Changer v3.1 is a FREEWARE, easy to use software that allows you to change MAC address of network adapter (NIC) instantenously.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus