Vulnerabilities Software

Wireless LAN Security and Management Software

ManageEngine WiFi Manager
 

AdventNet, Inc.
 

Wireless LAN security and management solution. Offers Access Point configuration, rogue AP detection and combined wired and wireless network monitoring. With dedicated RF Sensors the solution identifies the wireless network vulnerabilities and protects WLANs from intrusions and denial-of-service attacks.

Software Keywords: wlan management wireless intrusion detection wireless security rogue detection rogue ap wireless network management

 
Scan and monitor network.Over 35 net tools.

Nsauditor Network Security Auditor
 

Nsasoft LLC.
 

Nsauditor is a network security scanner that allows to audit and monitor network computers for possible vulnerabilities , to see all open ports on your system and owner program names, including the process loaded modules, kernel objects, memory details, remote address and state of connections, dns name, country where from, service associated with connection, possible trojans associated with port and service description.

Software Keywords: port scan port scanner network monitoring network software network utils network security

 
Hide your IP address over the net.

Surf Anonymous
 

Sa6ry Software House
 

SurfAnonymous is an internet utilities that hides your IP address, thereby saving you from the vulnerabilities associated with it. SurfAnonymous is fully automated. You don't need to have any knowledge of setting up proxy connections. Just "drag the mouse" over the application you want to change its IP and watch. SurfAnonymous includes the following funtional parts: 1) Proxy Hunter, 2) Proxy Analyzer, 3) Proxy Capture, 4) Proxy Pool.

Software Keywords: ip anonymous block mask address list

Security vulnerability scanning and fixing.

GFI LANguard Network Security Scanner
 

GFI Software
 

GFI LANguard Network Security Scanner (N.S.S.) checks a network for possible security vulnerabilities by scanning the entire network for missing security patches, services packs, open shares, open ports, unused user accounts and more. GFI LANguard N.S.S. is also a complete patch management solution; it can remotely deploy missing patches and service packs in applications and OS. GFI LANguard N.S.S. is the leading Windows security scanner.

Software Keywords: hotfix network monitor network vulnerability scanning port scanner

Checks if your web site is hackable!

Acunetix Web Vulnerability Scanner
 

Acunetix
 

Is your website hackable? Acunetix Web Vulnerability Scanner automatically scans your web applications / website (shopping carts, forms, dynamic content, etc.) for vulnerabilities to SQL injection, Cross site scripting, Google hacking & other web attacks. Hackers are concentrating their efforts on websites: 75% of cyber attacks are launched on web applications! Scan your web site today and find vulnerabilities before hackers do!

Software Keywords: cross site scripting security audit hackable sql web application security sql injection

Security auditing tool for Windows.

Winalysis
 

Winalysis Software Inc.
 

Archive Event Logs from multiple machines to a central database. Monitor for changes to files, the registry, users, groups, services, security policies, and more. Restore files and the registry from snapshots. Schedule jobs to monitor the network for critical changes, optionally generating alerts using SNMP traps, email, scripts, the event log... Create user-defined audit reports to help find security vulnerabilities and break-in attempts.

Software Keywords: snmp forensics winalysis md5 eventlog

Discover, Report, Remediate vulnerabilities

SecureCentral ScanFi Free Edition
 

AdventNet, Inc.
 

ScanFi is a web-based vulnerability management software for detecting, assessing and remediating network vulnerabilities across heterogeneous networks. ScanFi discovers, scans, reports and supports vulnerability remediation. It features both scheduled and on-demand vulnerability scanning capabilities, based on comprehensive vulnerability database collated from multiple sources and vendors that is constantly kept up-to-date.

Software Keywords: vulnerability management software vulnerability remediation security scanners vulnerability assessment vulnerability scanner network security tools

protects your computer against hackers attack

Rising Firewall 2007
 

Rising Antivirus International
 

Rising Firewall 2007 helps maintain your computer safe from data and privacy violation. Rising Firewall protects against external threats, checks vulnerabilities and potential risks on your computer and blocks malicious network traffic. Embedded 'Trojan Wall' directly blocks Trojans, spyware and malware from obtaining bank account numbers and passwords. It provides peace of mind when banking and shopping online. Trusted Zones IP Attack Track

Software Keywords: attack vulnerability check malicious programs block hackers trojan worm

Detecting and monitoring Bluetooth devices.

BlueAuditor
 

Nsasoft LLC.
 

BlueAuditor is a easy-to-use program for detecting and monitoring Bluetooth devices in a wireless network. It can discover and track any Bluetooth device and display key information about each device being detected as well as the services device provided. BlueAuditor will enable network administrators to effectively audit their wireless networks against security vulnerabilities associated with the use of Bluetooth devices.

Software Keywords: detecting network wireless services bluetooth

SecurityCheck vulnerabilities & corrections

Security Check
 

Moon Valley Software
 

SecurityCheck Audit common security vulnerabilities get corrective recommendations and easy remedies for Windows systems. Check & correct unset or blank passwords, prevent unauthorized changes to important system-wide settings and programs. Secure wireless networks & prevent unauthorized access to important, private data. Reduce or eliminate shared folders, a key security vulnerability. Eliminate Guest Accounts an easy access point to all data

Software Keywords: system check secure computer security settings securitycheck secure system corrections

 

Page 1 out of 3    1 2 3


 

Copyright © 2003-2012 TverSoft Software