Skip to main content

Directory: All Listings 

Results 701 - 720 of 1237 This Category
All Listings
Webroot Inc.

Complete PC threat protection including antivirus, antispyware, and firewall security Securely backs up over 5,000 photos online* (10GB) Improves PC performance with system cleanup More effective against malware than competing Internet security softw ...

Webroot Internet Security Complete

The Samurai Web Testing Framework is a LiveCD focused on web application testing. We have collected the top testing tools and pre-installed them to build the perfect environment for testing applications.

Category Website Scanners
Cimcor, Inc.

CimTrak is a comprehensive file integrity monitoring and compliance software application that is easy to use and less expensive then similar solutions.  Customers worldwide look to CimTrak as an alternative to other file integrity monitoring tools such as ...

CimTrak Integrity and Compliance Suite

Zabbix is listed here for it's Network Mapping and visualisation capabilities, but it is truly a Monitoring application. Auto discovery * Discovery by IP range, services and SNMP * Automatic monitoring of discovered devices

Category Network Mapping
Global TSCM Group, Inc.

The Stealth SM2020 is the most advanced portable speech protection system which protects you against listening and recording devices. The Stealth SM2020 creates sound barrier interference which masks your speech and any sound to be extremely difficult or ...

Global TSCM Group, Inc.

The only way to reliably detect wireless protocols is to use preselected chips (saw filters) which attenuate all other signals except the desired ones. This is the method implemented in the Protect Stealth 1207i which has 6 channels for different frequenc ...

Jason Bittel

httpry is a specialized packet sniffer designed for displaying and logging HTTP traffic. It is not intended to perform analysis itself, but to capture, parse, and log the traffic for later analysis. It can be run in real-time displaying the traffic as it ...

GlobalNet Training

Gain complete coverage of both SNAF (Securing Networks with ASA Foundation) AND SNAA (Securing Networks with ASA Advanced) with GlobalNet's intensive ASA Specialist 6-Day certification course. In less than one week, you will leave with your Cisco® ASA Spe ...

GlobalNet Training

GlobalNet Training’s 4-day Cisco Authorized* CCNA Wireless® Training Boot Camp, taught by CCSI Todd Lammle, is a high-energy, instructor-led course that provides system engineers and field engineers with a more in-depth understanding of the latest Cisco w ...

James Madison University

The Digital Forensics concentration combines core computer science concepts with an in-depth, technical study of digital forensics. The curriculum is highly system-oriented, where students gain deep insights into how operating systems, networks, and compu ...

James Madison University

The Five-Year Combined BS/MS Program provides an opportunity for JMU undergraduate students to complete an MS degree in only one additional year of study. Students in this program will complete all requirements of the regular BS degree in Computer Science ...

Yago Jesus and Patrick Gouin

Unhide is a forensic tool to find hidden processes and TCP/UDP ports by rootkits / LKMs or by another hidden technique. // Unhide (ps) Detecting hidden processes. Implements six techniques * Compare /proc vs /bin/ps output * Compare inf ...

Category Forensic Tools
The SANS Institute

The SANS SIFT Workstation is a VMware Appliance that is pre-configured with all the necessary tools to perform a detailed digital forensic examination. It is compatible with Expert Witness Format (E01), Advanced Forensic Format (AFF), and raw (dd) evidenc ...

AIR is a GUI front-end to dd/dc3dd designed for easily creating forensic images. by Steve Gibson and Nanni Bassetti Features: * auto-detection of IDE and SCSI drives, CD-ROMs, and tape drives * choice of using either dd or dc3dd (Note: dc3d ...

Category Forensic Tools

CAINE (Computer Aided INvestigative Environment) is an Italian GNU/Linux live distribution created as a project of Digital Forensics CAINE offers a complete forensic environment that is organized to integrate existing software tools as software modules ...

The CarolinaCon Group

CarolinaCon is an annual conference in North Carolina that is dedicated to sharing knowledge about technology, security and information rights. CarolinaCon also serves to enhance the local and international awareness of current technology related issues ...

Kristinn Gudjonsson

log2timeline is a framework for automatic creation of a super timeline. The main purpose is to provide a single tool to parse various log files and artifacts found on suspect systems (and supporting systems, such as network equipment) and produce a timeli ...

Category Forensic Tools
Golden G. Richard III

Scalpel is a fast file carver that reads a database of header and footer definitions and extracts matching files from a set of image files or raw device files. Scalpel is filesystem-independent and will carve files from FATx, NTFS, ext2/3, or raw partitio ...

Category Forensic Tools

Rifiuti2 analyses recycle bin files from Windows. Rifiuti2 can extract file deletion time, original path and size of deleted files. For more ancient versions of Windows, it can also check whether deleted items were not in recycle bin anymore (that is, eit ...

Category Forensic Tools
Rifiuti2

Qualys is the leading provider of on demand IT security risk and compliance solutions - delivered as a service. Qualys solutions enable organizations of all sizes to easily and cost-effectively ensure that their business technology systems remain highly s ...

Category Network Scanners
QualysGuard Vulnerability Management