(Page 6 of 72)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >

Platform: Windows 95/98

WinNmap
Added 2006-05-03
by ZwelL
WinNmap is a Windows GUI tool for nmap. It is based on nmap v3.95.For easy-using, WinNmap designed looks similar to the GTK style front-end(nmapfe), but more options. And as a GUI tool, you can operate it expertly just by click some buttons. This make nmap much easier to handle in an Win32 environment

cenfw
Added 2006-05-02
by Peter Robinson
The Centron IPTables Firewall Gui is an object oriented, database driven, windows interface to linux IPtables firewall rules. Now with Snat, Dnat and Masq Functionality. Many other bug fixes.

Keygloo
Added 2006-04-28
by Infinitrust Private Limited
This is a public key based authentication model that works by verifying whether the user is in posession of his private key. The user should have Keygloo installed in his system for authenticating himself into any Keygloo enabled web application. During login time, the user will be thrown a challenge password encrypted using his public key. The user can decrypt the password by clicking a 'Decrypt' button which appears in his toolbar after installing Keygloo. The decrypted password is submitted to the Keygloo enabled application by clicking a 'submit' button on the page. The Keygloo enabled applcation then authenticates the user into the system by comparing the decrypted password with the original challenge password. A demonstration of how the model works can be found at http://www.keygloo.com/Authentication/auth_kgnum.html. Keygloo is free to download and install from http://www.keygloo.com/Downloads.htm.

Bopup Scanner
Added 2006-04-17
by B Labs
Freeware scanner for local networks. It displays active computers with user login names (NetBIOS names), MAC and IP addresses, resolves HTTP (WEB) servers on remote computers (80, 8080 ports are default). Administrators and advanced users are able to specify IP range to scan and timeout to resolve a remote computer.

Bopup Messenger
Added 2006-04-17
by B Labs
Corporate instant messaging client for use in a business LAN with a set of enhanced features including standard software compatibility such as WinPopup and Messenger Service (net send), group messaging, automatic answering machine, message history, file transfer. Real-time communications can be organized with Peer-to-Peer or Client/Server instant messaging architecture. Using a central server users get powerful facilities for organization of effective communication system with news notification, centralized user grouping, offline message storing and automatic delivery, creation and management of public user information, receiving account list with user presence status.

Bopup Observer
Added 2006-04-17
by B Labs
One-way LAN instant messenger compatible with standard WinPopup and Messenger Service (Net Send command) software. A many features and functions include group messaging, log of message conversation, receiving files, advanced messages support with graphic images (smileys), network and URL addresses. Real-time communications can be organized with both Peer-to-Peer or Client/Server architecture. Using a central server user gets powerful facilities for organization of effective instant messaging system with news notification, centralized user grouping, offline message delivery, creation and management of public user information.

Google Talk Password Recovery
Added 2006-04-05
by Reactive Software
Google Talk Password Recovery is a utility for finding and decrypting Google Talk passwords that are stored on your computer with a click of a button! This password decoder works when "Remember Password" checkbox is ticked in Google Talk instant messenger. Passwords from multiple profiles can be recovered, all versions of Google Talk are supported. Jabber protocol is recognized. Proxy server passwords are also recovered.

Collapse Web Application Scanner
Added 2006-03-17
by Syhunt Security Team
Collapse, a free tool from Syhunt, allows web administrators to perform aggressive and comprehensive scans of an organization's web server to isolate vulnerabilities and identify security holes. The Collapse scanner requires basic inputs such as host names and port numbers to scan a complete web site and test all the web applications for security vulnerabilities. This new version includes new references for more than 3000 web vulnerabilities

East-Tec Eraser 2006
Added 2006-03-16
by EAST Technologies
Keep what you do on your computer to yourself! Protect your data and privacy and remove all evidence of your computer and online activity with East-Tec Eraser 2006. The product goes beyond U.S. Department of Defense standards for the permanent erasure of digital information and easily removes every trace of sensitive data from your computer: Internet history, Web pages, pictures, unwanted cookies, chatroom conversations and all traces of files, confidential documents or mails deleted in the past.

SECNOLOGY
Added 2006-03-08
by Sklyanchuk Oleg
SECnology is a Real-Time Logs Management Software that allows the user to respond effectively to rising threats in the security environment by collecting, analyzing and graphically displaying all security event information, generated by multiple and heterogeneous security devices. SECnology provides a seamless picture of enterprise security, enhancing and simplifying the visibility of corporate networks.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus