(Page 7 of 62)   < Prev  2 3 4 5 6 7 8 9 10 11 12  Next >

Category: Network Utilities

Bopup Scanner
Added 2006-04-17
by B Labs
Freeware scanner for local networks. It displays active computers with user login names (NetBIOS names), MAC and IP addresses, resolves HTTP (WEB) servers on remote computers (80, 8080 ports are default). Administrators and advanced users are able to specify IP range to scan and timeout to resolve a remote computer.

GNMS - Gnome Network Management System
Added 2006-03-26
by David Maciejak
GNMS is a tool to monitor state of network elements

XNmap
Added 2006-03-22
by Nathaniel Ritmeyer
A GUI for nmap, written in Cocoa

Collapse Web Application Scanner
Added 2006-03-17
by Syhunt Security Team
Collapse, a free tool from Syhunt, allows web administrators to perform aggressive and comprehensive scans of an organization's web server to isolate vulnerabilities and identify security holes. The Collapse scanner requires basic inputs such as host names and port numbers to scan a complete web site and test all the web applications for security vulnerabilities. This new version includes new references for more than 3000 web vulnerabilities

Network Equipment Performance Monitor
Added 2006-03-16
by Nova Software, Inc.
NEPM is a very general, highly configurable, two part software system that monitors any type of logged data from IP networked equipment and reports it via E-mail and web pages. Current conditions and history from systems based on Windows NT/2000 and UNIX can be tracked and reported. Most major server, switch and router systems can be monitored, without running agents on the target systems. Many networks behind separate firewalls can be reported on at one central site, and hard-to-reach isolated nets can be accessed. NEPM itself is system independent and can be hosted on either a UNIX or WinNT system or a combination of these with equal ease. NEPM monitors and reports uptime, critical events such as intrusion attempts, access rates, bytes-transferred rates, and error rates of network nodes. Unique precursor event links drill down instantly to the causes of downtime, intrusion events, etc. Performance graphs highlight element throughput and error rate. Hardware and software sub-systems within nodes are tracked and reported separately but in a common format that makes possible direct comparison. True hardware uptime is reported so that hardware and software performance can be separated from that of the communications links and from each other. Summary reports and alerts aggregate a view of an entire network's status onto a single page. Reports are provided via web pages posted to a web server for instant access to results. E-mailed text alerts provide prompt notification of dangerous conditions. NEPM is managed via a browser interface, providing full local or remote control from anywhere on the network. Use NEPM to increase your network uptime, increase network security, monitor QOS and SLA's, and evaluate new equipment. Equipment monitored can be Windows or Linux/UNIX/FreeBSD servers, or any processor-based system that logs events to non-volatile storage and has a telnet/rlogin/ssh/IP stream-mode interface

ARP Tools
Added 2006-03-10
by Krzysztof Burghardt
ARP Tools is collection of libnet and libpcap based ARP utilities. It currently contains ARP Discover (arpdiscover), an Ethernet scanner based on ARP protocol; ARP Flood (arpflood), an ARP request flooder; and ARP Poison (arppoison), for poisoning switches' MAC address tables.

MSN Protocol Analyzer
Added 2006-03-02
by Gordon Ahn
1. Overview MSNProtocol Analyzer(MSNPAnalyzer) is a network utility that can monitor (or capture, monitor) the sessions of MSN Protocol. If you use this program in conbination with SwitchSniffer program, you can capture and see all the MSNP sessions including conversations and MSN commands. >>>Benefits and Features: -. MSNPAnalyzer can monitor 2 NICs or more at once. -. MSNPAnalyzer can show MSN commands and the procedures of connection. -. MSNPAnalyzer enables you to see all the conversions on the network. -. If MSNPAnalyzer is used in conbination with SwitchSniffer program, You can capture all see all the MSN protocols and conversations. -. It is very easy to make MSNPAnalyzer to work. Just run MSNPAnalyzer on any computer on your network, and start to monitor. -. MSNPAnalyzer parses, decodes, analyzing MSN protocol in real-time. -. MSNPAnalyzer enables you to viewing the contents, commands and sessions of MSN protocol on-the-fly. >>> Who use it? [Developers] &#12288; want to see the MSN protocol including MSN commands to develope the products related to MSN. [Parents] &#12288; Want to know what their children are most concerned? [Company Managers] &#12288; Supervise your employees' chating at work, and conversation for reference later. 2. Getting Started 1) Install this program (MSN Protocol Analyzer). 2) Select Start->Programs->MSN Protocol Analyzer->MSN Protocol Analyzer 3) Just click "Start" button. 4) Looking at the main screen of MSNPAnalyzer.

tripp
Added 2006-03-01
by poplix
TRIPP is a utility to rewrite incoming and outgoing IP packets. Since it can rewrite both headers and payload, it can be used to configure the tcp/ip stack behavior in order to perform various tasks mainly intended for network tests, simulations and development. It is configured via a small rule-based language, which allows the user to intercept packets, set arbitrary header values, increment or decrement numeric header fields, set an arbitrary payload, rewrite parts of the payload, or fragment, multiply, or drop packets. It is totally user-level and doesn't require any kernel module.

Security Center Lite
Added 2006-02-24
by Lan-Secure
Security Center is network security software for real-time intrusion detection and prevention that helps to protect networks from potential intruders, unauthorized network connections and malicious network activities. Security Center key features are: Online network discovery, Automatic threat and vulnerability monitoring, Manual or automatic protection against potential intruders, Proactive blocking on unauthorized network connections, Email and SNMP alerts forwarding, Daily and weekly email reports, Threats and vulnerabilities statistics, Database exporting capabilities and wireless networks support. The Lite version supports up to 100 nodes.

Access Manager1
Added 2006-02-23
by www.net-pc-spy.com
Access Manager is an award wining software for monitoring the networked computers. This software can be helpful for government organization, companies, schools, colleges etc to monitor the activities on the computers. Its cleverly designed GUI offers you the access to various functions easily. It is very easy to use for both a novice user and an expert user. it allows real time monitoring of employees and continuous tracking of users activities on networked computers. Designed for monitoring employees, workers, students, tracking the usage of public computers in libraries or spying on individual network attached PC. Access Manager is used to track employees activities in organizations that have from two to hundreds networked computers. All monitoring options are configured remotely from a single PC. This employee monitoring software can record activity on all computers in LAN for future advanced analysis with excellent report generation capabilities. Using our PC monitoring software you will increase the productivity of working staff in your company.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus