Proactive Security Auditor FE 1.1.0
Proactive Security Auditor FE (Freeware Edition) is a free, small, fast and easy to use program to assist Windows(R) system administrators and ordinary users to keep their computers secure by identifying what security updates are installed on local and remote machines, and allowing to download and install missing patches from Microsoft web site.
See also: audit, vulnerability, patch, patches, update, updates, administrator, security, network
Network Security Map Poster 2006
All in one chart displays the network security risks in association with specific protocols, the most up-to-date security technologies and protocols, and the product solutions such as AAA solutions, firewalls, IDS/IPS, VPNs, as well as Anti-Virus Anti-Spyware/Anti-Adware Anti-Spam/Anti-Phishing systems. All security problems, technologies and solutions are well illustrated in the OSI 7-layers model and TCP/IP 4 Layers model.
See also: network vulnerability, network security, computer security, internet security, information security
Proactive Password Auditor 1.60
PPA is a password security test tool that's designed to allow Windows systems administrators to identify and close security holes in their networks. It helps secure networks by executing an audit of account passwords, and exposing insecure accounts. The software features brute-force and dictionary attacks on password hashes, effectively optimized for speed, and can also use pre-computed hash tables that allow to find most passwords in minutes.
See also: audit, recover, recovery, vulnerability, password, administrator, security, network
SecureCentral ScanFi Free Edition 4.1
ScanFi is a web-based vulnerability management software for detecting, assessing and remediating network vulnerabilities across heterogeneous networks. ScanFi discovers, scans, reports and supports vulnerability remediation. It features both scheduled and on-demand vulnerability scanning capabilities, based on comprehensive vulnerability database collated from multiple sources and vendors that is constantly kept up-to-date.
See also: Network Security Tools, Vulnerability Assessment Software, Vulnerability Scanner, Port Scanner, IP Scanner, Vulnerability Reports, Vulnerability Remediation, Vulnerability Management, Security Scanners, Vulnerability Management Software, Vulnerability Assessment
ContraVirus is able to detect and protect against a verity of Spyware, Adware, Trojans and other Malware. After removing existing infections, it uses its SpyWall feature, which will protect against infections before they make their way into your PC.
See also: live monitor, Spam, Adware, Keystroke Monitors, System Monitors, Trojan Viruses, Security Disablers, Browser Hijackers, Page Hijackers, firewall, security breach, security vulnerability, trojan, virus, spyware, adware, spyware threat, spyware monitor
Sax2 Intrusion detection system(Free) 3.0
Ax3soft Sax2 is a professional intrusion detection and prevention system that performs real-time packet capturing, 24/7 network monitoring, advanced protocol analyzing and automatic expert detection. By giving you insights into all of your network's operations, Sax2 makes it easy to isolate and solve network problems, identify network bottleneck and bandwidth use, detect network vulnerabilities and discovered the network.
See also: intrusion detection, intrusion prevention, intrusion detection system, IDS, intrusion prevention system, IPS, intrusion detection software, intrusion prevention software, internet security, information security, network security, internet threats, vulnerabilities, vulnerability management, regulatory compliance, managed security services, security research, security appliance, security software, NIDS
WebCruiser - Web Vulnerability Scanner 2.3.3
WebCruiser - Web Vulnerability Scanner, a compact but powerful web security scanning tool that will aid you in auditing your site! It has a Vulnerability Scanner and a series of security tools. It can support scanning website as well as POC for web vulnerabilities: SQL Injection, Cross Site Scripting, XPath Injection etc. So, WebCruiser is also an automatic SQL injection tool, an XPath injection tool, and a Cross Site Scripting tool!
See also: WebCruiser, Web Vulnerability Scanner, SQL Injection Tool, SQL Injection Scanner, SQL Injection, Cross Site Scripting, Web Security
GFI LanGuard 2012 SR1
GFI LanGuard gives you a complete picture of your network setup and helps you maintain a secure network state. It is a patch and vulnerability management solution which allows you to scan, detect, assess and rectify security vulnerabilities on your network. This is what is required to help comply with regulations such as PCI-DSS. It automates the essential task of patch management freeing up time for your staff and maximizing network uptime.
See also: security, security scanner, security scanning, vulnerability scanner, patching, network security, network monitor, network, port scanner, vulnerability scanning, server packs, hotfix, languard
True Eraser 1.0
TrueEraser is an advanced security tool for Windows, which allows you to completely remove sensitive data from your compute.TrueEraser implements the Department of Defense clearing and sanitizing standard DOD 5220.22-M, to give you confidence that once deleted with TrueEraser, your file data is gone forever.TrueEraser is also very easy to use.Just right click on any file/folder and choose TrueErase from the windows's context menu.
See also: file, delete, erase, shredder, wipe, security, obliterate, data, cleaner
PDF DLL BasePack 1.0
The function library package with the modules (dll) PDFinternals, PDFdocuments, PDFlayout and PDFsecurity for your own (batch-)application. Here bundled for a lower price! You can use the dlls with your commercial applications without paying any further fees - It's royalty free! The dlls are tested with delphi and vba/visual basic... but there should be no problems with any other main programming language, too. Read more on the product pages.
See also: DLL Delphi Visual Basic VBA pdf function Acrobat password document layout security Adobe properties batch library
BPACLer eliminates the tedious process of selecting a file or folder object and having to browse through each individual access control entry (ACE) to see the effective permissions for different users and groups (trustees). BPACLer quickly displays all allow and deny access control entries (ACE) from the ACL for a selected file or folder. The selected file or folder owner information is also displayed on the same screen.
See also: administrator, system, entry, security, folder, file, permission, List, Control, Access, ACE, ACL
CD-DVD Lock 2.11
CD-DVD Lock is intended for restricting read or write access to removable media devices such as CD, DVD, floppy and flash, as well as for restricting access to certain partitions of hard disk drives. CD-DVD Lock will allow you avoid many of headaches connected with unauthorized software installations from any removable media, and also prevent data leak by removable media.
See also: free, screen, lock, restrict, privacy, files, protect, control, access, administrator, security, password, Hard drive, DVD, download
Encryption Workshop 3.2 Build 060220
Encryption Workshop includes file and folder encryption and decryption tool. Currently nine strong symmetrical block ciphers are implemented: BLOWFISH, GOST, RC 4, DES, Skipjack, TWOFISH, TEA and XOR. Any type of file can be encrypted/decrypted, not only ZIP files. If working with ZIP archives you might want to consider using encryption rather than password protection - it is much safer.
See also: security, encryption, encrypt/decrypt folder, encrypt/decrypt file
Access Denied XP 1.1
Security program that request username and password on Windows load-up and fast lock your desktop by one mouse click . All unwanted people are getting away from your computer. It is stronger what Windows XP security. You can see and manage easily user privileges within colored list of users. Empty password users now can be fast detected too. Color logs allow you to take knowledge about usage of computer and detect intruder in appropriate time.
See also: access, denied, boot, lock, screen, protect, privileges, safe, guard, password, security
Advanced ID Creator Professional 6.10.25
Create and print professional ID cards and badges instantly! Advanced ID Creator allows you to create great looking id cards. Use the wide variety of tools to add text, graphics, shapes, barcodes, shadows and other effects to your design. Use the previously saved template to get started in a matter of seconds. Once your basic design is created tweak it or print it just the way it is. Create you own ID cards and badges in minutes!
See also: nametags, name tag, nametag, printing, printer, photo id, id cards software, id cards, card software, security, badge, id card printing, id card creation, id card, card, identification, barcode, badge, biometric, biometrics
Koffix Blocker 1.01
Koffix Blocker is a desktop application that helps you to block or restrict sites that are involved in questionable practices. When you surf the web you may sometimes accidentally visit sites that, for example, try to install some sort of spyware on your computer. If you had known that beforehand you probably wouldn't have visited these sites at all. Koffix Blocker can help you block these sites.
See also: phising, hole, exploit, security, privacy, spyware, freeware, free, worm, virus, trojan, spyware, zone, restricted, file, hosts, web, sites, site, blocker, block, koffix
Password Recovery Console 2.52.050505
The Password Recovery Console is a web-based application that enables the delegation of password recovery privileges. The Password Recovery Console interface can be accessed from any networked system, and can be configured to allow specific users in your enterprise to recover the password of any or all accounts that have been set and stored by User Manager Pro and/or Random Password Manager. The Password Recovery Console offers granular control.
See also: 2000, LANICU, HIPAA, SOX, Security, Management, Pwdump, Passwords, Hash, Migration, SAM, single sign on, forgot password, Common Credentials, Password Reset, Help Desk, 2003, Microsoft
HIPAA Security Rule Assistant 7.2
HIPAA Security Rule Assistant provides HIPAA covered entities a program to learn and understand the HIPAA Security Rule. It contains Risk Analysis worksheet, sample policy templates, sample disaster recovery plan, and a sample Incident Report form. It also has areas to tract actions taken and enter policies and procedures developed to meet the requirements of the rule. You can view the entire rule or portions thereof.
See also: HIPAA Security, HIPAA Consultant, HIPAA Assistant, HIPAA Security Rule, HIPAA
PHP Processor 18.104.22.168
PHP Processor is designed to help you protect your intellectual property when distributing PHP source files. The other use for PHP Processor is to optimize PHP source code and considerably decrease size of your source code files. PHP Processor provides a fast, intuitive way to obfuscate your PHP source code. Both variable and function names can be replaced with meaningless strings making your code difficult to read and alter for a third party.
See also: comments, code, backup, FTP, analyse, processor, security, PHP protect editor source analyse processor security FTP backup code comments, PHP, protect, source, editor
R-Firewall is an effective and easy-to-use solution to secure your on-line activity. It protects a computer connected to a local network and/or to the Internet against any intrusions, attacks, trojans, spyware, and other external and internal threats. R-Firewall also filters out inappropriate Internet pages content and blocks dangerous active components you may get while browsing over the Internet or receiving e-mail massages.
See also: Firewall, Online Security, On-line Security, Data Security, Data Protection, PC Protection