(Page 8 of 47)   < Prev  3 4 5 6 7 8 9 10 11 12 13  Next >

Platform: Windows XP

ADManager Plus
Added 2006-11-14
by AdventNet
ManageEngine ADManager Plus is a 100% web-based product that simplifies enterprise-wide Windows Active Directory management from a central point. The ADManager Plus, with its ease-of-use, intuitive UI, eliminates the need of using command line tools and scripts to manage the Active Directory. It saves the administrator's time with its integrated management and reporting module.

RiskProfile Tool
Added 2006-10-31
by Perimeter Internetworking
A uniquely powerful self-assessment and security planning tool for financial services institutions by Perimeter Internetworking, the only provider of complete e-security on demand. In a twenty-minute online session, the powerful RiskProfileTM system helps IT and technology executives align security plans and spending with the business risks of their institutions, and provides valuable data benchmarking the user’s results against other institutions.

SafePasswd
Added 2006-10-15
by Robert Accettura
Generate safe, secure and memorable passwords quickly and easily. If a password isn't memorable it isn't used. Also visually displays how effective a password is.

SoopMAC
Added 2006-10-12
by Socketsoft.net
SpoofMAC is a powerful, easy to use and intuitive MAC Address Changing (Spoofing) Tool for Windows systems. Includes Command-line Scripting, IPConfig and automatic spoofing tools.

Taof - the art of fuzzing
Added 2006-10-11
by Rodrigo Marcos
Taof is a GUI cross-platform Python generic network protocol fuzzer. It has been designed for minimizing set-up time during fuzzing sessions and it is especially useful for fast testing of proprietary or undocumented protocols. Taof aids the researcher during the data retrieval process by providing a transparent proxy functionality that forwards and logs requests from a client to a server. After the data retrieval phase, Taof presents the logged requests and allows the user to specify the fuzzing points within the requests.

UserLock
Added 2006-09-29
by IS Decisions
UserLock secures access to Windows networks by controlling the amount of simultaneous sessions and by limiting network access per user or group. With UserLock, a network administrator can implement and enforce efficient restriction and access policies for Windows NT/2000/XP/2003 networks (LAN and WAN), and monitor and manage all sessions in real time: receive alerts, remotely disconnect or lock a user session and automatically log activity and generate precise session reports and statistics.

SecurWall
Added 2006-09-18
by SecurStar
SecurWall is a personal desktop firewall designed to protect computers against malicious attacks, port scanning, viruses and other malicious software entities, making your PC invisible on the Internet and making your IP anonimous when surfing.

ShareCrypt
Added 2006-09-18
by SecurStar
ShareCrypt has been designed to effectively and transparently encrypt shared network drives or folders by allowing simultaneous data access to different users and preventing unauthorized access from non-authorized people

Drive Crypt
Added 2006-09-18
by SecurStar
1344 Bit, Military strong, transparent Hard Disk encryption. DRIVECRYPT securely and easily protects all proprietary data on notebooks and desktop computers 100% of the time. It can also hide your date into music files.

Drive Crypt Plus Pack
Added 2006-09-18
by SecurStar
Offers AES 256 bit, full disk encryption and pre-boot authentication. Able to protect the entire computer including the operating system, in real time. Only softwar able to hide the entire operating systemDCPP also works with external USB-Token.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus