(Page 10 of 89)   < Prev  5 6 7 8 9 10 11 12 13 14 15  Next >

Platform: Windows NT

GeSWall Server Edition
Added 2006-04-03
by GentleSecurity
With GeSWall Server Edition, you can harden your Web, Mail and SQL Servers. Hardening implies an isolation security policy that prevents damage from targeted intrusions and effectively precludes various attacks, known and unknown. Built on proven technology, GeSWall Server Edition provides powerful features to manage its security policy by means of Microsft Windows Group Policy and Active Directory.

PC-Time Manager
Added 2006-03-23
by Virtual Software LTD
PC-Time Manager is considered an access control security software that limits computer access time. If your kids are spending a lot of time chatting on the internet, or playing games, you have to set a time limit so as not to affect their grades.PC-Time Manager gives you the ability to share the same computer among your children by creating for each child a computer schedule. PC-Time Manager supports both languages English and French.

Virtual Screen Spy
Added 2006-03-23
by Virtual Software LTD
Virtual Screen Spy is a computer surveillance utility that performs continuous screen capture. Similar to a surveillance camera, Virtual Screen Spy captures images of your computer screen. Virtual Screen Spy takes a screenshot of the monitored windows user as selected in the screen capture control panel. The snapshots will be taken continuously every several seconds (adjustable), while being undetected by the monitored users. Virtual Screen Spy supports both English and French.

Collapse Web Application Scanner
Added 2006-03-17
by Syhunt Security Team
Collapse, a free tool from Syhunt, allows web administrators to perform aggressive and comprehensive scans of an organization's web server to isolate vulnerabilities and identify security holes. The Collapse scanner requires basic inputs such as host names and port numbers to scan a complete web site and test all the web applications for security vulnerabilities. This new version includes new references for more than 3000 web vulnerabilities

East-Tec Eraser 2006
Added 2006-03-16
by EAST Technologies
Keep what you do on your computer to yourself! Protect your data and privacy and remove all evidence of your computer and online activity with East-Tec Eraser 2006. The product goes beyond U.S. Department of Defense standards for the permanent erasure of digital information and easily removes every trace of sensitive data from your computer: Internet history, Web pages, pictures, unwanted cookies, chatroom conversations and all traces of files, confidential documents or mails deleted in the past.

Network Equipment Performance Monitor
Added 2006-03-16
by Nova Software, Inc.
NEPM is a very general, highly configurable, two part software system that monitors any type of logged data from IP networked equipment and reports it via E-mail and web pages. Current conditions and history from systems based on Windows NT/2000 and UNIX can be tracked and reported. Most major server, switch and router systems can be monitored, without running agents on the target systems. Many networks behind separate firewalls can be reported on at one central site, and hard-to-reach isolated nets can be accessed. NEPM itself is system independent and can be hosted on either a UNIX or WinNT system or a combination of these with equal ease. NEPM monitors and reports uptime, critical events such as intrusion attempts, access rates, bytes-transferred rates, and error rates of network nodes. Unique precursor event links drill down instantly to the causes of downtime, intrusion events, etc. Performance graphs highlight element throughput and error rate. Hardware and software sub-systems within nodes are tracked and reported separately but in a common format that makes possible direct comparison. True hardware uptime is reported so that hardware and software performance can be separated from that of the communications links and from each other. Summary reports and alerts aggregate a view of an entire network's status onto a single page. Reports are provided via web pages posted to a web server for instant access to results. E-mailed text alerts provide prompt notification of dangerous conditions. NEPM is managed via a browser interface, providing full local or remote control from anywhere on the network. Use NEPM to increase your network uptime, increase network security, monitor QOS and SLA's, and evaluate new equipment. Equipment monitored can be Windows or Linux/UNIX/FreeBSD servers, or any processor-based system that logs events to non-volatile storage and has a telnet/rlogin/ssh/IP stream-mode interface

SECNOLOGY
Added 2006-03-08
by Sklyanchuk Oleg
SECnology is a Real-Time Logs Management Software that allows the user to respond effectively to rising threats in the security environment by collecting, analyzing and graphically displaying all security event information, generated by multiple and heterogeneous security devices. SECnology provides a seamless picture of enterprise security, enhancing and simplifying the visibility of corporate networks.

MSN Protocol Analyzer
Added 2006-03-02
by Gordon Ahn
1. Overview MSNProtocol Analyzer(MSNPAnalyzer) is a network utility that can monitor (or capture, monitor) the sessions of MSN Protocol. If you use this program in conbination with SwitchSniffer program, you can capture and see all the MSNP sessions including conversations and MSN commands. >>>Benefits and Features: -. MSNPAnalyzer can monitor 2 NICs or more at once. -. MSNPAnalyzer can show MSN commands and the procedures of connection. -. MSNPAnalyzer enables you to see all the conversions on the network. -. If MSNPAnalyzer is used in conbination with SwitchSniffer program, You can capture all see all the MSN protocols and conversations. -. It is very easy to make MSNPAnalyzer to work. Just run MSNPAnalyzer on any computer on your network, and start to monitor. -. MSNPAnalyzer parses, decodes, analyzing MSN protocol in real-time. -. MSNPAnalyzer enables you to viewing the contents, commands and sessions of MSN protocol on-the-fly. >>> Who use it? [Developers] &#12288; want to see the MSN protocol including MSN commands to develope the products related to MSN. [Parents] &#12288; Want to know what their children are most concerned? [Company Managers] &#12288; Supervise your employees' chating at work, and conversation for reference later. 2. Getting Started 1) Install this program (MSN Protocol Analyzer). 2) Select Start->Programs->MSN Protocol Analyzer->MSN Protocol Analyzer 3) Just click "Start" button. 4) Looking at the main screen of MSNPAnalyzer.

Trillian Password Recovery
Added 2006-02-24
by Reactive Software
Trillian Password Recovery is a tool that will instantly find all Trillian accounts on your computer, extract encrypted passwords and decode these passwords. All versions of Trillian are supported (both Trillian Basic and Trillian Pro versions). Passwords from all protocols are extracted in all profiles that are on the PC. The program supports recovery of passwords from external files.

Access Manager1
Added 2006-02-23
by www.net-pc-spy.com
Access Manager is an award wining software for monitoring the networked computers. This software can be helpful for government organization, companies, schools, colleges etc to monitor the activities on the computers. Its cleverly designed GUI offers you the access to various functions easily. It is very easy to use for both a novice user and an expert user. it allows real time monitoring of employees and continuous tracking of users activities on networked computers. Designed for monitoring employees, workers, students, tracking the usage of public computers in libraries or spying on individual network attached PC. Access Manager is used to track employees activities in organizations that have from two to hundreds networked computers. All monitoring options are configured remotely from a single PC. This employee monitoring software can record activity on all computers in LAN for future advanced analysis with excellent report generation capabilities. Using our PC monitoring software you will increase the productivity of working staff in your company.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus