Proactive Security Auditor FE 1.1.0
Proactive Security Auditor FE (Freeware Edition) is a free, small, fast and easy to use program to assist Windows(R) system administrators and ordinary users to keep their computers secure by identifying what security updates are installed on local and remote machines, and allowing to download and install missing patches from Microsoft web site.
See also: audit, vulnerability, patch, patches, update, updates, administrator, security, network
Network Security Map Poster 2006
All in one chart displays the network security risks in association with specific protocols, the most up-to-date security technologies and protocols, and the product solutions such as AAA solutions, firewalls, IDS/IPS, VPNs, as well as Anti-Virus Anti-Spyware/Anti-Adware Anti-Spam/Anti-Phishing systems. All security problems, technologies and solutions are well illustrated in the OSI 7-layers model and TCP/IP 4 Layers model.
See also: network vulnerability, network security, computer security, internet security, information security
Proactive Password Auditor 1.60
PPA is a password security test tool that's designed to allow Windows systems administrators to identify and close security holes in their networks. It helps secure networks by executing an audit of account passwords, and exposing insecure accounts. The software features brute-force and dictionary attacks on password hashes, effectively optimized for speed, and can also use pre-computed hash tables that allow to find most passwords in minutes.
See also: audit, recover, recovery, vulnerability, password, administrator, security, network
SecureCentral ScanFi Free Edition 4.1
ScanFi is a web-based vulnerability management software for detecting, assessing and remediating network vulnerabilities across heterogeneous networks. ScanFi discovers, scans, reports and supports vulnerability remediation. It features both scheduled and on-demand vulnerability scanning capabilities, based on comprehensive vulnerability database collated from multiple sources and vendors that is constantly kept up-to-date.
See also: Network Security Tools, Vulnerability Assessment Software, Vulnerability Scanner, Port Scanner, IP Scanner, Vulnerability Reports, Vulnerability Remediation, Vulnerability Management, Security Scanners, Vulnerability Management Software, Vulnerability Assessment
ContraVirus is able to detect and protect against a verity of Spyware, Adware, Trojans and other Malware. After removing existing infections, it uses its SpyWall feature, which will protect against infections before they make their way into your PC.
See also: live monitor, Spam, Adware, Keystroke Monitors, System Monitors, Trojan Viruses, Security Disablers, Browser Hijackers, Page Hijackers, firewall, security breach, security vulnerability, trojan, virus, spyware, adware, spyware threat, spyware monitor
Sax2 Intrusion detection system(Free) 3.0
Ax3soft Sax2 is a professional intrusion detection and prevention system that performs real-time packet capturing, 24/7 network monitoring, advanced protocol analyzing and automatic expert detection. By giving you insights into all of your network's operations, Sax2 makes it easy to isolate and solve network problems, identify network bottleneck and bandwidth use, detect network vulnerabilities and discovered the network.
See also: intrusion detection, intrusion prevention, intrusion detection system, IDS, intrusion prevention system, IPS, intrusion detection software, intrusion prevention software, internet security, information security, network security, internet threats, vulnerabilities, vulnerability management, regulatory compliance, managed security services, security research, security appliance, security software, NIDS
WebCruiser - Web Vulnerability Scanner 2.3.3
WebCruiser - Web Vulnerability Scanner, a compact but powerful web security scanning tool that will aid you in auditing your site! It has a Vulnerability Scanner and a series of security tools. It can support scanning website as well as POC for web vulnerabilities: SQL Injection, Cross Site Scripting, XPath Injection etc. So, WebCruiser is also an automatic SQL injection tool, an XPath injection tool, and a Cross Site Scripting tool!
See also: WebCruiser, Web Vulnerability Scanner, SQL Injection Tool, SQL Injection Scanner, SQL Injection, Cross Site Scripting, Web Security
GFI LanGuard 2012 SR1
GFI LanGuard gives you a complete picture of your network setup and helps you maintain a secure network state. It is a patch and vulnerability management solution which allows you to scan, detect, assess and rectify security vulnerabilities on your network. This is what is required to help comply with regulations such as PCI-DSS. It automates the essential task of patch management freeing up time for your staff and maximizing network uptime.
See also: security, security scanner, security scanning, vulnerability scanner, patching, network security, network monitor, network, port scanner, vulnerability scanning, server packs, hotfix, languard
Ken Messenger 5.0.2
Ken Messenger is an Instant Messaging software. Works either with our free public server or with your own private Instant Messenger Server. It allows companies, organisations, institutions and dispersed workgroups to create and control their own private messaging network (Free up to 5 connected users) without having to use and depend on public IM servers.
See also: training, distance learning, distance, learning, colleges, college, universities, university, schools, school, educational, education, dispersed, privacy, private, IM network, networks, network, networking, extranet, VPN, intranet, internet, economical, cost-effective, cost effective, return on investment, ROI, compliance, compliant, finance, financial, medical, HIPAA, rules, SEC, NASD, off-line, offline, on-line, online, file transfer, files, file, message, messages, traffic, encryption, encrypted, security, secure, non-profit, Sonork EIM, GTV, Sonork, organizational, organization, industry, government, business, company, professional, EIM, enterprise instant messaging, enterprise, messenger, messaging, instant, instant messenger, instant messaging, Instant Messenger Server, KenMessenger Server, Ken Messenger Server, Instant Messenger, Messenger, KenMessenger, Ken Messenger, Wilcom2, collaboration, collaborating, work-group, workgroup, webapp, web application, web applications, application, applications, webapps, conference, conferencing, chat, chatting, chatrooms, peer-to-peer, p2p, peer to peer, server, servers
FingerCell PC EDK for Linux 1.2
FingerCell 1.2 Embedded Development Kit for PC with Linux. This EDK is intended for developers, who are going to create an embedded biometric system with a server on PC with Linux. Includes 1 license for FingerCell shared library, interfaces for image input from either files or fingerprint sensors, sample application with source code and software documentation.
See also: access control, authentication, ridge, crime, scan, security, biometric, evaluation, demo, binary, linux, embedded, verification, matching, identification, recognition, fingerprint, pattern recognition, criminalistics
Rock Solid Contact US System 0.7.2
A secure Contact US web form write in PHP, with visual optional confirmation, optional email confirmation, internationalization, easy to customize with template. Keep email private, eliminate 99.99% undesired spam. Prevent bot automation and invalid/spoof email. Double validations client/server keep resources used to minimum.
See also: communication, spoofing, spoof, privacy, security, anti-spam, spam, email, mail, apache, sqlite, php, form, web, Contact, Solid, Rock, template
Mil Shield 5.0
Mil Shield 5.0 protects your privacy by deleting all tracks from your online or offline computer activities: cookies, cache, history, INDEX.DAT files, Firefox tracks and all other tracks. There are some unique features in this program: Selective cleaning (selectively preserves cache, history and/or cookies for chosen by you safe Internet sites), Panic key combination, Automatic cleaning, Support for multiple user accounts.
See also: UserData records, typed URL history, home page, start page, privacy, most recently used, MRU, recent documents, evidence, tracks, cache, Firefox, Internet Explorer, history, cookies, automatic, security, index.dat, remove, delete, erase, clean
This superb utility eliminates your surfing tracks. Cache files, Cookies, Visited URLs, Typed URLs, History Folders, Strays, Recent Links, the IE UserData folder, Recycle Bin and the Windows Temp Folder are the categories you can eliminate. PurgeIE now has functions to assist in Cookie Control. PurgeIE manages its cleanup functions without requiring a system restart. Supports IE-4 thru IE-6. A recent upgrade implements a tabbed User interface.
See also: washer, strays, autocomplete, privacy, tracks, dropdown, typed urls, url, urls, files, cleaner, security zones, cookie blocking, history, cookies, cookie, cache, explorer, internet, userdata, index.dat, purge, purgeie, wash, tif, searches
Data Recall 1.0
Data Recall is Windows-based application that will easily and securely store of all of your critical data. Data Recall allows you to store an unlimited number of user names, passwords, web site URL's, insurance policies, bank accounts, and much more.
Data Recall automatically sets up over 40 pre-defined categories, and their related fields. You can modify these pre-defined categories, delete the categories, and add your own custom categories.
See also: Infokeep, security, encrypted, passwords, data, information management, password, secure, Info Keep, Ignyte Software
System Security 2006 4.0.0
System Security 2006 is the next generation of computer-security software. Software that enables you to protect your system from unauthorized use and unauthorized users. System Security 2006 includes new methods to secure and prevent unwanted use of your system. With this software, you can also disable feature of Windows to make your system even more secure.
See also: disable unauthorized, protect, protect pc, secure windows, windows security, restrict, secure, lock, lock pc, lock desktop, pc security, protection, system, security, system security, restrict access, limit access
AVIRA Antivirus for Sendmail-Milter (Linux) 1.0.2
AVIRA Antivirus for Sendmail-Milter checks all incoming and outgoing emails and, depending on the result of the scanning process, the emails are blocked or delivered. Email notifications can be issued for the message sender, the recipient and the administrator. The program scans emails based on their sender and recipient addresses, isolating suspicious and infected files, blocking emails containing suspicious archives or suspicious MIME emails.
See also: linux virus protection, email scanner, server antivirus programs, email filters, antivirus mail server, phishing, email viruses, network virus protection, antivirus linux, email virus, antivirus for linux, email filter, antivirus sendmail, email virus detection, linux security, email virus scanner, linux antivirus, email antivirus
StorageSafe provides high performance security for USB and IEEE1394 based storage with on-the-fly device encryption, guards against 180,000+ common passwords, and secure file/device erase. Devices are split into custom sized public and private areas. The public area is not encrypted. The private area is encrypted with the 256-bit Advanced Encryption Standard. Protected devices look and feel the same as before.
See also: flash disk, hard disk, FireWire, IEEE 1394, USB, FIPS 140-2, Encryption, Security, Secure Hash Algorithm, AES, Advanced Encryption Standard, Privacy, Secure Erase, 5220.22-M, HIPAA, Sarbanes-Oxley
Home CHAOS 3.5
Encrypt text files, images, documents, programs and entire folders giving additional security to your information. . Drag and Drop support. CHAOS made the security simple.
See also: GOST, safety, e-mail, shredder, protect, chaos, stream cipher, public key, security, Blowfish
Metadata Analyzer 2.0
Metadata can get you into trouble! Whenever an MS Office document is created it is complemented with such properties as the author, corporate name, document changes, editing time and other metadata. All this makes the private information available to a third party that may put your company at financial risk and/or an embarrassing situation. Metadata Analyzer shall advise you of this information and prevent its unauthorized disclosure.
See also: Document Integrity, MS Office Metadata, Document Security
PDFBlackbox (VCL) 4.2
PDFBlackbox (VCL Edition) is a comprehensive collection of native components that help you compress, encrypt and sign PDF documents from your Delphi or Kylix applications. Both symmetric and certificate-based (X.509) encryption and signing is supported. VCL edition can be used with Delphi 4-7 and 2005-2006, C++Builder 4-6 and Kylix 2-3.
See also: VCL, Delphi, control, component, encryption, certificate, sign, compress, encrypt, security, PDF