(Page 7 of 40)   < Prev  2 3 4 5 6 7 8 9 10 11 12  Next >

Category: System Security Management

EagleEyeOS One
Added 2006-01-13
by EagleEyeOS Llc.
The assorted function capacity comprises above all the monitoring and blocking of external devices and storages, additionally protects against data leakage. It is a quick and efficient, and simple solution to protect electronic data and documents and it is easy-to-install for single-computer systems and smaller networks.

Solsoft Firewall Manager
Added 2006-01-09
by Solsoft Inc.
Solsoft Firewall Manager provides customers with centralized management of security policies across heterogeneous platforms that include leading firewall, router, switch, VPN, and IDS/IPS platforms.

Solsoft NetfilterOne
Added 2006-01-09
by Solsoft Inc.
is a graphical interface that will automate the design, deployment and documentation of security rules and policies as they pertain to a networked Netfilter firewall - the packet filtering framework inside the Linux 2.4.x and 2.6.x kernel series

AlgoSec Firewall Analyzer
Added 2006-01-08
by Yoss Dvir
Overview The manual audit of a firewall policy is a very subjective and laborious process which is dependent on the user’s skill set and experience. The AlgoSec Firewall Analyzer (FA) automatically and non-intrusively analyzes a firewall’s policy. Within a matter of minutes, it identifies rules that cause security holes and offers detailed guidance about how to close them. FA flags rule errors that would otherwise go unnoticed and exposes risks hidden deep within the corporate firewall policy. The vulnerabilities that FA reveals allow you to make sure that there are no "hidden" or unknown risks embedded in the corporate firewall policy. FA offers peace of mind to IS managers regarding their firewall policy.

Chaz Network Secuirty Scanner
Added 2006-01-06
by Nima Bagheri
Chaz Network Security Scanner is a tool that allows network administrators and Manegements to quickly and easily perform a network security audit. Chaz combines the functions of 30 scanner. New Version Has following Tools : FTP Password Cracker BASE 64 Password Cracker MD5 Password Cracker Hardware Viewer Information List Accounts On Domain NNTP Client FTP Client for more see http://www.rootkit.com/vault/neocrackr/chaz.pdf

SwitchSniffer
Added 2006-01-01
by Gordon Ahn
1. Overview SwitchSniffer is a program that can scan your switched LAN for up hosts and can reroute and collect all packets without the target users' recognition. It can also detect the ‘arpspoofer’ program running on the network and block user definable sessions like firewall. If you use this program in tandem with any sniffer program, you can capture and see the users’ IDs and passwords on a switched network. >>> What's new: -. MAC Based Blocking. -. Converting the ip address into the country name. -. Export the view data into an excel file -. Coloring each row items. Employing the speed bars. Finding out the collision of ip addresses. >>> Features: -. SwitchSniffer can poll and collect all the packets on the switched LAN. -. SwitchSniffer can scan and display the active hosts on the LAN quickly, and automatically. -. While spoofing ARP tables, SwitchSniffer can act as another gateway (or ip-forwarder) without other users' recognition on the LAN.' -. It can collect and forward packets by selecting inbound, outbound, and both to be sent to the Internet. -. An ARP table is recovered automatically in about 30 seconds. But, SwitchSniffer can keep spoofing continuously by updating the target computer’s ARP table more frequently. -. If one or more network interface cards are installed on a computer, you can choose which NIC you would like SwitchSniffer to scan and spoof through. -. SwitchSniffer can display information about the amount of data transferred to and from the internet. -. SwitchSniffer can detect if any computer on the LAN is running an ‘arpspoofer’ program. -. SwitchSniffer can filter: sessions, local hosts, and remote hosts. The installation of the ‘winpcap’ driver is not necessary for SwitchSniffer. -. SwitchSniffer can manage the local hosts based on MAC Address. -. SwitchSniffer can act as a plug-and-played router. -. SwitchSniffer can export the data of view into an excel file. >>> Benefits: -. SwitchSniffer can find hidden hosts on the LAN. -. SwitchSniffer can find if abnormal hosts are connected to your wireless network. -. SwitchSniffer protects your network from abnormal users. -. SwitchSniffer can check if there are abnormal packets on the LAN. -. SwitchSniffer allows you to capture user IDs, passwords, chat sessions and web sessions etc., on the switched network through the use of a sniffer application. -. SwitchSniffer can block the local hosts based on MAC Address. -. SwitchSniffer can resolve the problem of IP Collision. -. SwitchSniffer can find out the contry name by ip address on remote. -. SwitchSniffer enables you to monitor all the packets on a switch network.

netdiscover
Added 2005-12-11
by Jaime Peñalba Estebanez
Netdiscover is an active/passive address reconnaissance tool, mainly developed for those wireless networks without dhcp server, when you are wardriving. It can be also used on hub/switched networks. Built on top of libnet and libpcap, it can passively detect online hosts, or search for them, by actively sending arp requests, it can also be used to inspect your network arp traffic, and find network addresses using auto scan mode, which will scan for common local networks.

XPFiremon
Added 2005-12-06
by Inferno
XPFiremon is a system tray monitoring application for the builtin Windows XP Firewall. It will monitor the settings and services and alert if they are stopped or disabled. Windows should also alert you if the firewall is disabled but depending on the circumstances it appears slow to do so. It's also comforting to many users to see something saying that their protection is active and not just inactive. XPFiremon also provides an easy right click interface for managing the firewall(stopping, starting, or configuring).

Trojan Scan
Added 2005-11-30
by
Trojan scan is a simple shell script that allows for simple but relatively effective checking for trojans, rootkits and other malware that may be using your server and network for unwanted (and possibly illegal) purposes. It works by listing all processes that use the Internet with the lsof command (using -Pni flags). This list is then transformed into signatures. These signatures then are matched against the allowed process defined in the configuration. If any signatures of running processes are found that do not match the allowed signatures, an email report is sent including ps, ls, and optional lsof output.

Coarse PortKnocking
Added 2005-11-03
by Andre Luiz Rodrigues Ferreira
This is a simple implementation of Port Knocking techniques. This sniffs network packets with determined keys and executes commands like firewall to open and close ports. In the client mode injects packets with key to server.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus