(Page 10 of 72)   < Prev  5 6 7 8 9 10 11 12 13 14 15  Next >

Platform: Windows 95/98

LC 5
Added 2005-04-25
by @stake
LC 5 is the latest version of L0phtCrack, the award-winning password auditing and recovery application used by thousands of companies worldwide. Using multiple assessment methods, LC 5 reduces security risk by helping administrators to: * Identify and remediate security vulnerabilities that result from the use of weak or easily guessed passwords * Recover Windows and Unix account passwords to access user and administrator accounts whose passwords are lost or to streamline migration of users to another authentication system * Rapidly process accounts using pre-computed password tables* that contain trillions of passwords

Enig3
Added 2005-04-11
by CCC Morocco Team
Enig3 is a free cryptography tool that can encrypt/decrypt content/data using your own private generated 128 Bits Enig3-Key, was developed on CCC-Morocco Labs, using the most complex cryptographic methodologies. It uses a Flow-Encoding technique which is done in 3 phases...

ldaupenum
Added 2005-04-06
by Roni Bachar & Sol Zehnwirth
ldapenum is a perl script designed to enumerate system and password information from domain controllers using the LDAP service when IPC$ is locked. The script has been tested on windows and linux.

TextKeeper
Added 2005-03-21
by HardwareCrasher
Encrypts text using numeric combinations and two algorithms, One of the algorithms uses 5 different numeric combinations.

DeSPAM Tunnel
Added 2005-03-21
by The German Computer Freaks (Du-Nu)
This program is a tunnel for pop3 connections and filters spam during the pop3-download of emails automatically. To determine whether an email is UCE it evaluates the content of each email that passes the tunnel statistically. Its intelligent wordparsing filter "backMatch" even matches buzzwords that contain characters which have been replaced by similar looking special chars to avoid being filtered.

SafeLogon
Added 2005-02-09
by GemiScorp Software Solutions
SafeLogon is a multi-user and password-based access control utility that enhances and complements the Windows built-in logon and authentication system. In other words, SafeLogon allows you to protect your system at home and office from unauthorized access. SafeLogon is fully configurable and allows its Administrator to: - Restrict access to Windows to certain users, optionally controlling the days of the week and the time of the day the user is allowed to log on and

SafeSystem
Added 2005-02-09
by GemiScorp Software Solutions
SafeSystem is a security program that allows you to prevent access to your personal and important files and folders, as well as protect and guarantee the integrity and well functioning of your system. SafeSystem can make your files and folders completely invisible, inaccessible or simply read-only. Furthermore, SafeSystem can prevent the change of configuration and the accidental (or even intentional) system files deletion or alteration, so your PC will be healthy

SQL column finder
Added 2005-02-09
by Rafal Bielecki
Helps you to find exact columns number when using union select query

SigupShield
Added 2005-02-04
by Protecteer, LLC
A fraud alert (Anti-Phishing) software integrated with a full life-cycle password manager & form filler. SignupShield generates unlimited number of unique passwords and disposable email addresses for signing-up to web sites. It fills sign-up forms and encrypts passwords and email addresses for later use during sign-in.

PE Explorer
Added 2005-01-25
by Heaventools Software
PE Explorer is a tool for inspecting and editing the inner workings of Windows 32-bit executable files. It offers a look at PE file structure and all of the resources in the file, and reports multiple details about a PE file (EXE, DLL, ActiveX controls, and several other Windows executable formats). Once inside, file structure can be analyzed and optimized, hostile code detected, spyware tracked down, problems diagnosed, changes made and resources repaired.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus