Search: Home Bugtraq Vulnerabilities Mailing Lists Security Jobs Tools
(Page 1 of 68)   1 2 3 4 5 6 7 8 9 10 11  Next >

Platform: Windows 2000

UserLock
Added 2006-09-29
by IS Decisions
UserLock secures access to Windows networks by controlling the amount of simultaneous sessions and by limiting network access per user or group. With UserLock, a network administrator can implement and enforce efficient restriction and access policies for Windows NT/2000/XP/2003 networks (LAN and WAN), and monitor and manage all sessions in real time: receive alerts, remotely disconnect or lock a user session and automatically log activity and generate precise session reports and statistics.

SecurWall
Added 2006-09-18
by SecurStar
SecurWall is a personal desktop firewall designed to protect computers against malicious attacks, port scanning, viruses and other malicious software entities, making your PC invisible on the Internet and making your IP anonimous when surfing.

ShareCrypt
Added 2006-09-18
by SecurStar
ShareCrypt has been designed to effectively and transparently encrypt shared network drives or folders by allowing simultaneous data access to different users and preventing unauthorized access from non-authorized people

Drive Crypt
Added 2006-09-18
by SecurStar
1344 Bit, Military strong, transparent Hard Disk encryption. DRIVECRYPT securely and easily protects all proprietary data on notebooks and desktop computers 100% of the time. It can also hide your date into music files.

Drive Crypt Plus Pack
Added 2006-09-18
by SecurStar
Offers AES 256 bit, full disk encryption and pre-boot authentication. Able to protect the entire computer including the operating system, in real time. Only softwar able to hide the entire operating systemDCPP also works with external USB-Token.

SpoofMAC
Added 2006-09-14
by Socketsoft.net
SpoofMAC is a powerful, easy to use and intuitive MAC Address Changing (Spoofing) Tool for Windows systems. Includes Command-line Scripting, IPConfig and automatic spoofing tools. SpoofMAC allows users to change the MAC Address of Network Adapters on Windows 2000, XP and 2003 Server systems. SpoofMAC helps people protect their privacy by hiding their MAC Address and helps IT Professionals test network security and recover MAC Address based software licenses. SpoofMAC was developed by certified IT Security and Software Development professionals.

N-Stalker Web Application Security Scanner 2006
Added 2006-09-13
by N-Stalker
N-Stalker Free Edition allows for quick security assessment of Web Applications under the perspective of Infrastructure and Deployment phases. It scans for more than 18,000 vulnerabilities, crawl your web application, discover hidden directories/files and look for backup files.

JAAScois PC Monitor v1.0
Added 2006-09-10
by JAAScois
» Protecting system and windows startup » Protecting internet explorer from hijacks & spyware » Preventing access to computer settings » Internet filtering for web sites , chat rooms and e-mail

MSN Password Recovery
Added 2006-09-07
by Reactive Software
MSN Messenger Password Recovery is the MSN password finder that instantly cracks and decrypts the MSN Messenger and Windows Messenger passwords stored on your computer. New version adds support for latest Windows Live Messeger (version 8).

Softros LAN Messenger
Added 2006-09-07
by Softros Systems, Inc.
Softros LAN Messenger is an easy-to-use, serverless LAN messaging application for effective intra-office communication. Features include: - Message notification alarms - Personal or group messaging - File transfers - Encryption options - Message logs - Microsoft/Citrix Terminal Services support

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox





VeriSign SSL Certificates secure e-commerce transactions



 

Privacy Statement
Copyright 2006, SecurityFocus