(Page 7 of 47)   < Prev  2 3 4 5 6 7 8 9 10 11 12  Next >

Platform: Windows XP

Windows Privacy Tray (WinPT)
Added 2007-02-13
by Timo Schulz
WinPT is a taskbar front-end for GnuPG which includes key management, encryption via the clipboard, direct file encryption and support for OpenPGP smartcards.

S.I.T.H. 2048bit Secure Client
Added 2007-01-25
PROTEXX (SITH) Secure Wireless Secure Information Technology Highway (SITH)™ is next generation wireless technology, developed by PROTEXX, that provides enhanced levels of security and greater user authentication to eliminates the ability of anyone from monitoring your Internet activity or stealing your personal or corporate data.The Secure Information Technology Highway™ ensures that server, client and remote communications are done with a secured environment with more than 10X the security level by today's standards.

Source Security
Added 2007-01-15
sourcesec.com provides Web-based access to code auditing applications, and was created to assist developers and users in auditing their programs for vulnerabilities. You can upload your code for static analysis by RATS, Flawfinder and ITS4 as applicable - the C/C++, PHP Python and Perl languages are supported. Additionally, a simplified search function is available which easily allows efficient Web searches for security-related information.

Venak & Avenak Detection Scanner
Added 2007-01-10
by Nima Bagheri
Introduction Venak & Avenak scanner is tool for protection your system form some threat files likes spys, viruses, worm and rootkits. It reality this is a detection tool. This tool also use from a new technology that called MPS (Main Protection System). In fact Main Protection System or MPS is a cause and effect system. MPS is a logical system. The MPS like a tracer, any Service, process or Driver has own File, with this method we will trace route any threat or function on windows. Basic Features All events likes: • Processes (Heaps, Modules, Handlers, Threads, Processes Addresses and Process Sign) • Md5 Signature • List of Derivers in system with their states • Unloading Kernel Drivers • Services • All active Ports ( TCP/UDP) • Files types • Give Handlers ( Explorer's name , Page's Name , Hwnds) • Event log monitoring • Startup files • Explorer files • Explorer Registry keys – Beta 2 • Monitoring ports and users – Beta 2 Extra Features • Sensitive strings The sensitive string is way for finding some viruses that makes same name likes Svchost, Lsass, Winlogon and many other original windows functions, if any process has same name like those the Program makes an alert and shows a security threat. For example if any process be in "C:\windows\" and have "svchost" name it's already a threat. You can audit this method and make the special sensitive for yours. When the system finds any problem, makes an alert. • Analyzing the Processes with PID Brute Force Some rookits try to hide own Process PID, with this trick we can find these processes. Some tools like Fu and some Hidden Processes with an SSDT Hook use this method to hide them self. Also these tool use by changing in NewZwQuerySystemInformation functions and analysis the results and filter them. They try to change the query of these process lists and when we are using by some basic function in "kernel32.dll" we see the filter result. As this point we can find the other tools like some protection tool for example: Rootkit removers and some Viruses scanners. Some files that didn't have any path string are a threat. • IAT ( Import Address Table) IAT is a global table that contains a list of all the function pointers to any function mapped into the running process. With this tool you can see all these value for per process. • Online Testing Online testing is a powerful part of this program. Like most antivirus this program have a potential method with using from shell programming in windows. With online searching, when you're open your Explorer like IE or Windows Explorer the system fined your current target (Folder). The system searching for all Executable files likes DLLs and EXE files in current folder. After finding these files the program makes a MD5 Signature from all files and start searching in Threat List, when find same Sign, makes an alert. • Twice extension The old trick using by viruses programmers is two extensions for one file like: document.txt.exe. In searching directories when the system find these type files makes an alert and give the signature of file in threat list. • MD5 Signature You can see the MD5 signature of any loaded processes and modules in system with this option. In Beta 1 version finding the threat is manually type but in Beta 2 we have online and automatic testing and detection. • Path Checking Path checking is a simple way to detect some loading processes into system as threat. When In loading processes we have a process with null path file and it isn't be an original services that we detect before ,the system make an alert for this process and it show with Magenta color. good luck , nima

Scuba by Imperva
Added 2007-01-05
by Imperva
Scuba by Imperva is a free, lightweight Java tool that scans Oracle, DB2, MS-SQL, and Sybase databases for hundreds of software vulnerabilities. It also detects configuration flaws like insecure passwords, unsafe processes, unrestricted permission levels, and more. Furthermore, it generates HTML and Java reports that show overall security risk level and detailed information about each vulnerability – so you can pinpoint configuration risks within minutes. Scuba by Imperva detects hundreds of database vulnerabilities and configuration issues. And better yet – it helps you meet industry-leading best practices standards for database configuration and management.

Technitium MAC Address Changer v4
Added 2006-12-19
by Shreyas Zare
Technitium MAC Address Changer allows you to change Machine Access Control (MAC) Address of your Network Interface Card (NIC) irrespective to your NIC manufacturer or its driver. It has a very simple user interface and provides ample of information regarding each NIC in the machine. Every NIC has an MAC address hard coded in its circuit by its manufacturer. This hard coded MAC address is used by windows drivers to access Ethernet Networks (LAN). This tool can set a new MAC address to your NIC, bypassing the original hard coded MAC address. Technitium MAC Address Changer is a must tool in every security professionals tool box. Technitium MAC Address Changer v4.0 is coded in Visual Basic 6.0.

Added 2006-12-12
by Arley Silveira
TXDNS is a Win32 aggressive multithreaded DNS digger/bruteforcer. Capable of placing, on the wire, thousands of DNS queries per minute. TXDNS main goal is to expose a domain namespace trough a number of techniques.

Pandora FMS
Added 2006-12-11
by Pandora Team
Pandora is a monitoring application to watch systems and applications, that allows to know the status of any element of your systems, watch for your hardware, your software, your multilayer system and of course your Operating System. Pandora could detect a network interface down, a defacement in your website, a memory leak in one of your server, or the movement of any value of the NASDAQ new technology market. Pandora could sent a SMS message when your systems fails... or when Google value low below US$ 330.

Added 2006-11-22
by Vitas Ramanchauskas
WinPassword (formerly known as NT Password) is an application for NT / 2000 / XP / 2003 system administrators for finding breaches in system security. It tries to recover plain-text passwords analyzing user password hashes. If it is possible to recover a password within reasonable time, the password should be considered insecure. WinPassword also can be used to recover lost passwords of particular users. Please note that this program is for advanced users and system administrators with good understanding of NT security model. WinPassword uses both traditional recovery methods (Brute Force Attack, Dictionary Search) and the Smart Table Recovery (TM) technique (based on "Rainbow Tables"), allows recovering long and complex passwords quickly: 7 characters password (all characters) can be recovered in 40 minutes (using Brute Force Attack the password can be recovered in 29 days).

Specops Password Policy
Added 2006-11-16
by Special Operations Software
Specops Password Policy is an advanced password filter that gives you more than one password policy per domain in Windows. Something that Microsoft left out from Windows 2000 and Vista. With Specops Password Policy you can have an unlimited number of password policies per Active Directory domain. Specops Password Policy also increases your password granularity options a lot compared to the built-in password policy settings in Windows.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus