New Corporate Security Software for Windows 2000
GFI LanGuard is an award-winning vulnerability and patch management solution trusted by tens of thousands of businesses to protect millions of computers on their networks. GFI LanGuard acts as your virtual security consultant to provide all three of these...
Detecting if WebDAV is enabled. Testing IIS WebDAV authentication bypass vulnerability (CVE-2009-1676) . Listing directory and files. find a protected folder (/secret/) and then try inserting the %c0%af...
PenDrive Locker/Unlocker utility is a small, simple yet truly portable program designed to unlock windows registry which prevent someone to use Flash Drive/Mass Storage/External Drive on USB port. This program also suitable for system administrator to...
Rohos replaces password based Windows login/access with a USB flash drive. Program offers secure, fast and yet user friendly way of workstation locking by using USB drive, eToken, or Bluetooth mobile. Program works in any existing Windows logon...
Encrypt and Isolate Sensitive Data and Software Impose custom DRM on specific content Protect your licensed Thin Apps, Virtualized Software, and licensed Virtual Machines from theft and license violations. Keep it all vLocked! on one machine! ...
SpectraByte Anti-Executable Security is an essential tool especially made
to enforce Parental Control and Security Policy Administration that suites
the security need of Networked/Workgroup Computers such as School Computer
laboratories, Cyber Cafes,...
This is a simple tool which reads a targets sitemap.xml file, dumps all the elements (URL's) and displays them in a GUI of which all the links can be clicked and navigated. This is a more elegant and practical way of mapping out a web server. Doing so...
EmiliOSE by AutumnTECH is a self-contained e-mail messaging server appliance built to effectively block e-mail spam and viruses before it reaches your production e-mail server.
EmiliOSE by AutumnTECH is delivered in ISO CD-ROM format for installing on...
Spector 360 active monitoring allows you to record, alert on, review and report employee computer and network activity such as IM/chat, emails sent and received, websites visited, web searches, applications used and files transferred or printed. Alerts...
Malicious File Hunter software lets you remotely search for any malware file(s) on any Windows computer on your network simply using file names. While other security tools scan files with definitions, heuristics and match them against one or multiple...