(Page 10 of 47)   < Prev  5 6 7 8 9 10 11 12 13 14 15  Next >

Platform: Windows XP

SQL Password
Added 2006-09-04
by Vitas Ramanchauskas
SQL Password is a password recovery tool for Microsoft SQL Server that can recover password for registered user accounts. The following versions of MS SQL Server are supported: 2000, 2005, 2005 Express as well as Microsoft SQL Server Desktop Engine (MSDE) 2000. Because of the nature of the security system used in MS SQL Server, you have two options when recovering lost or forgotten passwords: 1) you can try to recover the original password. MS SQL Server encrypts passwords and they cannot be easily decrypted, so SQL Password uses the following recovery methods to crack them: Brute Force Attack, Dictionary Attack and Smart Force Attack. Although there is a guarantee that the password will be recovered, it may take a long time. So, in most cases (i.e. an administrator who has forgotten his or her password) the best option is the second one: 2) you can reset the password to a known one. SQL Password performs this operation instantly by modifying the master.mdf file where SQL Server stores passwords. If you use this feature, you do not have to wait until the password is cracked, though the original password remains unknown. This change is transparent and you may continue to work with the database as usual, using the new password to log on. You can use SQL Password to recover or reset any password found in the user accounts file of MS SQL Server, including the password for the system administrator (whose username is "sa"). Like every other our password recovery tool, SQL Password is efficient, reliable and easy-to-use. We constantly update it to support the latest versions of MS SQL Server. The latest version supported at the moment is 2005. Please check our website for updates and more information. Note: if SQL Server is configured to use the standard Windows security accounts ("Windows authentication mode"), SQL Password will not be able to recover passwords.

Email Detective - Forensic Software Tool
Added 2006-08-31
by Hot Pepper Technology, Inc.
Any AOL email that has been cached or saved on a users disk drive is extracted, complete with all embedded pictures. EMail Detective - Forensic Software Tool - for use with all versions of America Online, is used by many law enforcement agencies in the U.S. and has become an invaluable tool in numerous investigations and data recovery by forensic examiners. Any AOL email that has been cached or saved on a users disk drive is extracted, complete with all embedded pictures. A comprehensive report is produced for the examiner detailing the results.

SwitchSnarf
Added 2006-08-26
by Ekrem ORAL
SwithSnarf enables monitoring the internet connection of any computer in a network established with a switch. SwitchSnarf scans all working computers in the local network and identifies their MAC addresses, IP addresses and Computer Names (Hostnames). The internet in/out going internet connections of a computer can be monitored in cooperation with any network monitoring programme (sniffer) or the Nexeye Monitoring Enterprise. No changes are required in the network setup and no additional software is needed on the computer that is monitored. Technical Structure: In a local network established with a switch, the packages are sent to the relevant computer only. SwitchSnarf utilises ARP packages that are used for identifying the computer details. By capturing the ARP packages that are sent to the gateway, SwitchSnarf monitors the network traffic.

Security Quiz Screensavers
Added 2006-08-22
by Michael Hendrickx
This adaptable screensaver written in C# shows a basic security quiz on the screen. This can be used for awareness or just plain fun. .NET framework required.

WinPT - Windows Privacy Tray
Added 2006-08-18
by Timo Schulz
WinPT is a taskbar front-end for GnuPG which includes key management, encryption via the clipboard, direct file encryption and support for OpenPGP smartcards.

CryptoSearch
Added 2006-08-08
by Password Crackers, Inc.


Engage Packet builder
Added 2006-08-06
by G. Wilmes
A powerfull and scriptable packet Builder, being useful to build parsonalized packet with the aim of testing the security of your firewall, network, etc... (TCP, IP, UDP, ICMP)

Rootkit's Unloader
Added 2006-08-05
by Nima Bagheri
Rootkit's Unloader It's tool for unmapping the modules and loaded Rootkit's DLLS. It also can terminate the Threads and processes. For Unloading the Rootkits first you must know your target's DLL After finding these Processes you can terminate the Library. Tip: Before selecting this you must close and save your Program's Data, because this Program erasing all Threads and Maybe Your Lose your data .TerminateThread is a dangerous function that should only be used in the most extreme cases. You should call TerminateThread only if you know exactly what the target thread is doing, and you control all of the code that the target thread could possibly be running at the time of the termination. Down load's Link Full Source Code with Binary https://www.rootkit.com/vault/neocrackr/Rootkits_Unloader.rar E-Mail Thecrackers_group<>AT<>Yahoo<>DOT<>CA

Nexeye Monitoring Enterprise
Added 2006-08-04
by Ekrem ORAL
How efficient is your internet connection being utilised? Does your network users utilising the internet to the purpose of your organisation? Which web sites are your users browsing? Do you have a control of the content of the e-mails sent from your network? What kind of e-mails are received by whom in your network? Is MSN Messenger used in your network? For what purpose? Monitor network activities Monitor network users web, e-mail and MSN Messenger activities on a real-time basis with nexeye Monitoring. Monitor network utilisation Monitor on a real-time basis the network traffic from/to the Internet as well as the traffic generated by the individual users. Analyse and report the network data Analyse the logged data and create professional reports with the report templates. Transform the huge amount of network information to reports that make sense. nexeye measures and displays the amount of traffic from the LAN to internet and from internet to the LAN. With the statistical information provided by this function, the user is provided valuable information of how effectively and efficiently the network is utilised. With this information the band-with of the network can be planned and optimised. The statistical information can be organised and displayed by hours of the day, days of the week or by months. Web connections from the LAN to the internet can be monitored real-time by each individual user. nexeye can be pre-configured to monitor and log specific types of url/mime, whereby only “critical” web connections may be monitored. This monitoring is performed independent of the program that has initiated the connection. nexeye monitors and logs e-mails from and to users in real-time. The logs can be sorted and grouped by “from”, “to”, “subject” or “date”. All in- and outgoing e-mails are recorded in EML format on the disk and can be viewed with a standard e-mail programme such as Outlook Express.

Essential Taceo
Added 2006-07-28
by
Essential Taceo is e-mail anti-theft software that enables small business owners to prevent theft and misuse of information sent via e-mail. Encryption plus controls to prevent forwarding, editing, printing and screen capture allow the sender to determine how a recipients can use an email, as well as ensure the privacy and integrity of e-mail communications. Taceo is affordable and easy to use, so users can focus on their business, not their software.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus