(Page 8 of 40)   < Prev  3 4 5 6 7 8 9 10 11 12 13  Next >

Category: System Security Management

Secrets Protector Pro 2005
Added 2005-10-21
by E-CRONIS Software
A three-in-one privacy protector tool built for those who like their personal stuff handled carefully. This product gives you the features of a folder locker, a secure eraser and a privacy manager. The Hide Secret File’s proud successor, enforced with strong encryption, secure file deletion technique and a smart built-in trace remover will help you to protect your secret data and online privacy better than ever. All confidential data will be hidden beyond the reach of ANY intruder and you will be the only one able to handle them. And what you want to delete will be DELETED. Your personal classified data and your online and offline activity traces will be wiped for good. Secrets Protector Pro 2005 is the ultimate security tool to protect your sensitive information on your personal computer meeting the three most important security issues: Integrity, Confidentiality and Availability. The information is protected at file system level and it cannot be accidentally deleted or overwritten neither in Safe Mode nor in other operating systems. The strong encryption used in Secrets Protector Pro 2005 assures an extra protection for your securely hidden files. The program allows you to permanently erase your sensitive data using secure wiping methods, leaving no trace of your information. Your erased data is unrecoverable using software or even hardware recovery techniques. The built-in Privacy Manager clears with secure erasing methods the system and browser traces keeping your activity in secret and saving disk space wasted by temporary files.

e-Surveiller
Added 2005-10-16
by SurveilleTech, LLC.
e-Surveiller is a powerful user-activity monitoring, logging and surveillance suite. With it, you can record all keystrokes, Web site visits, windows, AOL, AIM, ICQ, MSN and Yahoo chats, etc. of computer users on standalone computers, on a local area network and on remote computers across the Internet. You view the screens of monitored users on a LAN or across the Internet in real-time! User-activity logs are also periodically uploaded or emailed to you for analysis + MORE!

Event Log Explorer
Added 2005-10-09
by FSPro Labs
Event Log Explorer is a free software for viewing, monitoring and analyzing events recorded in Security, System, Application and another logs of Microsoft Windows NT/2000/XP/2003 operating systems. It extends starndard Event Viewer monitoring functionality and brings new features.

SecureCentral ScanFi
Added 2005-09-30
by AdventNet Inc.
ScanFi is a vulnerability management and reporting software for detecting and assessing network vulnerabilities, open ports and missing patches across heterogeneous networks comprising servers, workstations, laptops, routers, switches and other network entities.

SecureCentral PatchQuest
Added 2005-09-30
by AdventNet Inc.
PatchQuest is a patch management software to distribute and manage security patches and hotfixes & service packs for Windows and Linux systems. It operates in both agent-based and agentless modes.

SafeGuard Easy by Utimaco
Added 2005-09-14
by Utimaco Safeware
Total hard disk encryption using AES and Blowfish. Uses Pre-Boot Authentication for complete protection of your system

LogManager
Added 2005-09-06
by R.Mercier & C.Charbonnaud (lmcr@free.fr)
LogManager is targeted to be deployed in Security Operation Centers to collect, manage and analyze log messages generated by applications and/or network equipments. Moreover, it offers capability to third party products to correlate these log messages.

WiFiManager
Added 2005-08-17
by AdventNet
Integrated wlan security and Management tool. Identifies the vulnerabilities in the wlan, the intrusion attempts and mitigates wlan attacks. Helps in configuring the Access Points and in firmware upgrade.

Proactive Password Auditor
Added 2005-07-30
by ElcomSoft Co.Ltd.
Proactive Password Auditor is a password security test tool that's designed to allow Windows NT, Windows 2000, Windows XP and and Windows Server 2003-based systems administrators to identify and close security holes in their networks. Proactive Password Auditor helps secure networks by executing an audit of account passwords, and exposing insecure account passwords. If it is possible to recover the password within a reasonable time, the password is considered insecure. The software supports a few different methods of obtaining password hashes for further attack/audit: from dump files (generated by 3rd party tools like pwdump/pwdump2/pwdump3), Registry of local computer, binary Registry files (SAM and SYSTEM), memory of local computer, and memory of remote computers (Domain Controllers), including ones running Active Directory. The product features brute-force and dictionary attacks on LM and NTLM password hashes, effectively optimized for speed, plus "rainbow" attack, that uses pre-computed hash tables that allow to find most passwords in minutes instead of days or weeks.

Proactive System Password Recovery
Added 2005-07-30
by ElcomSoft Co.Ltd.
Proactive System Password Recovery is a program to recover all types of Windows passwords: logon password (when user is logged on and has Admin privileges), screensaver password, .NET Passport password, RAS and dial-up passwords, passwords to shared resources, SYSKEY startup password, passwords stored in cached credentials, Wireless (WEP and WPA-PSK) encryption keys etc. The program also shows all users and groups (with their properties), allows to run any programs in other user's context, show password history hashes, read password hashes from SAM and SYSTEM files, read Protected Storage records, decrypt Windows scripts, reveal passwords hidden under the asterisks, enable disabled controls, and run brute-force and dictionary attacks on PWL files (Windows 9x). Finally, it shows product IDs and CD keys for Windows, Microsoft Office and other Microsoft software installed.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus