List Categories and Listings by D

Welcome to the largest underground hacking event in the world. DefCon hosts lots of small, regional meetings, and a DefCon event that coincides with the Black Hat Briefings in Las Vegas.

ModifiedNever

DEFT Linux 6 is based on the new Kernel 2.6.35 (Linux side) and the DEFT Extra 3.0 (Computer Forensic GUI) with the best freeware Windows Computer Forensic tools. DEFT it’s a new concept of Computer Forensic live system that use LXDE as desktop environmen ...

VendorDEFT Linux
Pricing ModelOpen Source
ModifiedNever

DefensePro’s behavior-based, self-learning mechanism proactively scans for anomalous network, server and client traffic patterns. When detecting an attack, DefensePro characterizes the attack’s unique behavior, establishes a real-time signature and create ...

Category IPS Network
VendorRadware Ltd.
Pricing ModelCommercial
Modified

DefenseWall HIPS (Host Intrusion Prevention System) is the simplest and easiest way to protect yourself from malicious software (spyware, adware, keyloggers, rootkits, etc.) when you surf the Internet! Using the next generation proactive protection techno ...

Category Host IPS
VendorSoftsphere Technologies
Pricing ModelFree download, Cost for registration
ModifiedNever

Disco is a passive IP discovery and fingerprinting utility designed to sit on segments distributed throughout a network to discover unique IP's on the network. In addition to IP discovery disco has the ability to passively fingerprint TCP SYN packets and ...

VendorLinux, BSD
Pricing ModelFreeware
Modified

Domino Scan II is specially developed to present the attacker's eye view of the security issues surrounding Lotus Domino Web servers and bespoke Notes applications. Running on Microsoft Windows, DominoScan II has the capability to audit Lotus Domino Web S ...

Category Website Scanners
VendorNGS Secure
Pricing ModelCommercial
Modified

DoorStop was the first Macintosh firewall, for Mac OS 8.1 in 1998. Open Door has been shipping security products since that time. We know how to help you make your Macintosh secure on the Internet.

VendorOpen Door Networks
Pricing ModelCommercial
Modified

Dante is a circuit-level firewall/proxy that can be used to provide convenient and secure network connectivity to a wide range of hosts while requiring only the server Dante runs on to have external network connectivity. Once installed, Dante can in most ...

VendorInferno Nettverk A/S
Pricing ModelFree, Commercial Support
Modified

D-Link?, provider of Firewall/VPN Security Appliances, introduces the VPN Client software to complement the NetDefend family of firewall hardware. This VPN client software provides a complete and secure way for remote clients to communicate with their com ...

Category VPN Clients
VendorD-Link Corporation
Pricing ModelCommercial
Modified

Dr.Morena is a tool to confirm the rule configuration of a Firewall.

VendorSecurityFriday Co. Ltd.
Pricing ModelFree
Modified

Darik's Boot and Nuke ("DBAN") is a self-contained boot floppy that securely wipes the hard disks of most computers. DBAN will automatically and completely delete the contents of any hard disk that it can detect, which makes it an appropriate utility for ...

VendorDark Horn
Pricing ModelFreeware
Modified

Diskzapper Dangerous automatically begins erasing all the disks as soon as the booting process is completed. No user action is required. This was intended to be used on computers for which it is not convenient to plug in a keyboard and monitor.

VendorPhil Howard.
Pricing ModelCOMMERCIAL
Modified

The program is designed to "wipe" hard disks to meet Department of Defense standards from the Rainbow series concerning declassification (wiping) of hard disks and cleansing of floppy disks. Declasfy writes the entire disk with hex 0s, then 1s (0xff), the ...

VendorMares and Company, LLC
Pricing ModelCOMMERCIAL
Modified

Provides over two dozen indexed and unindexed text search options for all popular file types. Supports full-text as well as field searching in all supported file types. Has multiple relevancy-ranking and other search sorting options. dtSearch can instantl ...

Category Forensic Tools
VendordtSearch Corp.
Modified

Don't settle for half the data. Most commercial cell phone forensic software only gets logical data files. That's like doing an investigation on half a crime scene. If a tool doesn't have advanced analysis features, it's probably because they don't get ...

Category Forensic Tools
VendorParaben Corp.
Pricing ModelCommercial
Modified

Hunts down information, old and new, on the user's PC. Shows you a slide show of downloaded images. Runs from the floppy drive. Takes up few resources within a network or computer system. Lets you customize the search parameters. Generates custom rep ...

Category Forensic Tools
VendorTech Assist, Inc.
Pricing ModelCOMMERCIAL
Modified

FrontRange DeviceWall Endpoint Security is a critical part of any organization's Data Loss Prevention (DLP) strategy, securing network endpoints against the risk of accidental or deliberate security breaches. DeviceWall locks down the unauthorized use of ...

VendorFrontRange Solutions USA
Pricing ModelCommercial
Modified
Dell SonicWALL

Dell SonicWALL offers a variety of flexible email security solutions to match the unique email security needs of your organization—whether you have one user or 100,000. From appliances and software to virtual appliances and services, all solutions o ...

VendorSonicWALL
Pricing ModelCommercial
Modified

The annual DIMVA conference serves as a premier forum for advancing the state of the art in intrusion detection, malware detection, and vulnerability assessment. Each year DIMVA brings together international experts from academia, industry and government ...

VendorDIMVA
Pricing ModelCommercial
Modified

© Computer Network Defence Limited 2019