< Prev 1 2 3 4 5 6 7 8 9 10 11 Next >
S.I.T.H. 2048bit Secure Client
PROTEXX (SITH) Secure Wireless Secure Information Technology Highway (SITH) is next generation wireless technology, developed by PROTEXX, that provides enhanced levels of security and greater user authentication to eliminates the ability of anyone from monitoring your Internet activity or stealing your personal or corporate data.The Secure Information Technology Highway ensures that server, client and remote communications are done with a secured environment with more than 10X the security level by today's standards.
sourcesec.com provides Web-based access to code auditing applications, and was created to assist developers and users in auditing their programs for vulnerabilities. You can upload your code for static analysis by RATS, Flawfinder and ITS4 as applicable - the C/C++, PHP Python and Perl languages are supported. Additionally, a simplified search function is available which easily allows efficient Web searches for security-related information.
Pandora is a monitoring application to watch systems and applications, that allows to know the status of any element of your systems, watch for your hardware, your software, your multilayer system and of course your Operating System. Pandora could detect a network interface down, a defacement in your website, a memory leak in one of your server, or the movement of any value of the NASDAQ new technology market. Pandora could sent a SMS message when your systems fails... or when Google value low below US$ 330.
Generate safe, secure and memorable passwords quickly and easily. If a password isn't memorable it isn't used. Also visually displays how effective a password is.
LM-X License manager
License manager enabling ISVs to control and safely distribute their software. Lots of features and wide platform support.
P-Synch® is enterprise password management software. It reduces the frequency of help desk calls, improves user productivity and strengthens security with password synchronization, self-service password reset, help desk password reset and simplified administration of other authentication factors, such as hardware tokens and biometric samples. P-Synch supports over 70 types of systems.
darc - Distributed Aide Runtime Controller
darc is a multi-threaded Python application designed for managing AIDE installations in large heterogeneous networks. It provides centralized database management, unified reporting, and eliminates the need to maintain Aide databases and binaries on read-only media.
Network Equipment Performance Monitor
NEPM is a very general, highly configurable, two part software system that monitors any type of logged data from IP networked equipment and reports it via E-mail and web pages. Current conditions and history from systems based on Windows NT/2000 and UNIX can be tracked and reported. Most major server, switch and router systems can be monitored, without running agents on the target systems. Many networks behind separate firewalls can be reported on at one central site, and hard-to-reach isolated nets can be accessed. NEPM itself is system independent and can be hosted on either a UNIX or WinNT system or a combination of these with equal ease. NEPM monitors and reports uptime, critical events such as intrusion attempts, access rates, bytes-transferred rates, and error rates of network nodes. Unique precursor event links drill down instantly to the causes of downtime, intrusion events, etc. Performance graphs highlight element throughput and error rate. Hardware and software sub-systems within nodes are tracked and reported separately but in a common format that makes possible direct comparison. True hardware uptime is reported so that hardware and software performance can be separated from that of the communications links and from each other. Summary reports and alerts aggregate a view of an entire network's status onto a single page. Reports are provided via web pages posted to a web server for instant access to results. E-mailed text alerts provide prompt notification of dangerous conditions. NEPM is managed via a browser interface, providing full local or remote control from anywhere on the network. Use NEPM to increase your network uptime, increase network security, monitor QOS and SLA's, and evaluate new equipment. Equipment monitored can be Windows or Linux/UNIX/FreeBSD servers, or any processor-based system that logs events to non-volatile storage and has a telnet/rlogin/ssh/IP stream-mode interface
A Unix Based (Linux/OpenBSD/Etc) full featured "war dialer". MySQL/ASCII Flat file logging, tone/silence location, banner detection, "curses" front end.
Free Random WEP/WPA-PSK online generator tool
Create and customize random WEP/WPA-PSK Key with this online tool.
Browse by category