< Prev 2 3 4 5 6 7 8 9 10 11 12 Next >
Category: System Security Management
The assorted function capacity comprises above all the monitoring and blocking of external devices and storages, additionally protects against data leakage. It is a quick and efficient, and simple solution to protect electronic data and documents and it is easy-to-install for single-computer systems and smaller networks.
Solsoft Firewall Manager
Solsoft Firewall Manager provides customers with centralized management of security policies across heterogeneous platforms that include leading firewall, router, switch, VPN, and IDS/IPS platforms.
is a graphical interface that will automate the design, deployment and documentation of security rules and policies as they pertain to a networked Netfilter firewall - the packet filtering framework inside the Linux 2.4.x and 2.6.x kernel series
AlgoSec Firewall Analyzer
Overview The manual audit of a firewall policy is a very subjective and laborious process which is dependent on the users skill set and experience. The AlgoSec Firewall Analyzer (FA) automatically and non-intrusively analyzes a firewalls policy. Within a matter of minutes, it identifies rules that cause security holes and offers detailed guidance about how to close them. FA flags rule errors that would otherwise go unnoticed and exposes risks hidden deep within the corporate firewall policy. The vulnerabilities that FA reveals allow you to make sure that there are no "hidden" or unknown risks embedded in the corporate firewall policy. FA offers peace of mind to IS managers regarding their firewall policy.
Chaz Network Secuirty Scanner
Chaz Network Security Scanner is a tool that allows network administrators and Manegements to quickly and easily perform a network security audit. Chaz combines the functions of 30 scanner. New Version Has following Tools : FTP Password Cracker BASE 64 Password Cracker MD5 Password Cracker Hardware Viewer Information List Accounts On Domain NNTP Client FTP Client for more see http://www.rootkit.com/vault/neocrackr/chaz.pdf
1. Overview SwitchSniffer is a program that can scan your switched LAN for up hosts and can reroute and collect all packets without the target users' recognition. It can also detect the arpspoofer program running on the network and block user definable sessions like firewall. If you use this program in tandem with any sniffer program, you can capture and see the users IDs and passwords on a switched network. >>> What's new: -. MAC Based Blocking. -. Converting the ip address into the country name. -. Export the view data into an excel file -. Coloring each row items. Employing the speed bars. Finding out the collision of ip addresses. >>> Features: -. SwitchSniffer can poll and collect all the packets on the switched LAN. -. SwitchSniffer can scan and display the active hosts on the LAN quickly, and automatically. -. While spoofing ARP tables, SwitchSniffer can act as another gateway (or ip-forwarder) without other users' recognition on the LAN.' -. It can collect and forward packets by selecting inbound, outbound, and both to be sent to the Internet. -. An ARP table is recovered automatically in about 30 seconds. But, SwitchSniffer can keep spoofing continuously by updating the target computers ARP table more frequently. -. If one or more network interface cards are installed on a computer, you can choose which NIC you would like SwitchSniffer to scan and spoof through. -. SwitchSniffer can display information about the amount of data transferred to and from the internet. -. SwitchSniffer can detect if any computer on the LAN is running an arpspoofer program. -. SwitchSniffer can filter: sessions, local hosts, and remote hosts. The installation of the winpcap driver is not necessary for SwitchSniffer. -. SwitchSniffer can manage the local hosts based on MAC Address. -. SwitchSniffer can act as a plug-and-played router. -. SwitchSniffer can export the data of view into an excel file. >>> Benefits: -. SwitchSniffer can find hidden hosts on the LAN. -. SwitchSniffer can find if abnormal hosts are connected to your wireless network. -. SwitchSniffer protects your network from abnormal users. -. SwitchSniffer can check if there are abnormal packets on the LAN. -. SwitchSniffer allows you to capture user IDs, passwords, chat sessions and web sessions etc., on the switched network through the use of a sniffer application. -. SwitchSniffer can block the local hosts based on MAC Address. -. SwitchSniffer can resolve the problem of IP Collision. -. SwitchSniffer can find out the contry name by ip address on remote. -. SwitchSniffer enables you to monitor all the packets on a switch network.
Netdiscover is an active/passive address reconnaissance tool, mainly developed for those wireless networks without dhcp server, when you are wardriving. It can be also used on hub/switched networks. Built on top of libnet and libpcap, it can passively detect online hosts, or search for them, by actively sending arp requests, it can also be used to inspect your network arp traffic, and find network addresses using auto scan mode, which will scan for common local networks.
XPFiremon is a system tray monitoring application for the builtin Windows XP Firewall. It will monitor the settings and services and alert if they are stopped or disabled. Windows should also alert you if the firewall is disabled but depending on the circumstances it appears slow to do so. It's also comforting to many users to see something saying that their protection is active and not just inactive. XPFiremon also provides an easy right click interface for managing the firewall(stopping, starting, or configuring).
Trojan scan is a simple shell script that allows for simple but relatively effective checking for trojans, rootkits and other malware that may be using your server and network for unwanted (and possibly illegal) purposes. It works by listing all processes that use the Internet with the lsof command (using -Pni flags). This list is then transformed into signatures. These signatures then are matched against the allowed process defined in the configuration. If any signatures of running processes are found that do not match the allowed signatures, an email report is sent including ps, ls, and optional lsof output.
This is a simple implementation of Port Knocking techniques. This sniffs network packets with determined keys and executes commands like firewall to open and close ports. In the client mode injects packets with key to server.
Browse by category