This forensics training course (3 days) gives delegates a practical understanding of Data structures and potential evidence as produced in Apple Mac OS X environments and Implementing forensic tools on Mac OS X-based file systems. Highlights of this t ...
The Metasploit Framework is a development platform for creating security tools and exploits. The framework is used by network security professionals to perform penetration tests, system administrators to verify patch installations, product vendors to perf ...
This specialist course focuses on the technical aspects of computer system security and systems management. The award is designed to provide up-to-date, relevant and practical information on the technical aspects of computer security. This field is becomi ...
McAfee Web Gateway analyzes the nature and intent of all content and code entering the network from requested web pages, providing immediate protection against malware and other hidden threats. Powered by layered security that combines local and cloud-bas ...
MailXaminer is a comprehensive email examination tool to carry out a thorough analysis of a bunch of emails and its header. With the help of this tool; forensicators can preview more than 20 email file types and perform advanced search operation within th ...
Windows Defender is software that helps protect your computer against pop-ups, slow performance, and security threats caused by spyware and other unwanted software by detecting and removing known spyware from your computer. Windows Defender features Real- ...
Have you ever considered what makes an anti-malware application effective? We at Malwarebytes have created an easy-to-use, simple, and effective anti-malware application. Whether you know it or not your computer is always at risk of becoming infected with ...
Cisco Security Monitoring, Analysis, and Response System (MARS) provides security monitoring for network devices and host applications supporting both Cisco and other vendors. Security monitoring with MARS greatly reduces false positives by providing an e ...
MiniStumbler is a tool for Windows CE that allows you to detect Wireless Local Area Networks (WLANs) using 802.11b, 802.11a and 802.11g. It has many uses: * Verify that your network is set up the way you intended. * Find locations with poor co ...
MacStumbler is a utility to display information about nearby 802.11b and 802.11g wireless access points. It is mainly designed to be a tool to help find access points while traveling, or to diagnose wireless network problems. Additionally, MacStumbler can ...
Mognet is a free, open source wireless ethernet sniffer/analyzer written in Java. Currently being rewritten in C++
McAfee® Internet Security makes PC and online protection easy for everyone. This set-it-and-forget-it solution comes with award-winning McAfee SiteAdvisor® web security, so you know the safety of web sites before you visit, bank, shop or trade online. Thi ...
Microsoft Internet Security and Acceleration (ISA) Server 2006 is an integrated network edge security gateway that helps protect IT environments from Internet-based threats while providing users fast and secure remote access to applications and data. ISA ...
Sadly, m0n0wall has reached it's End-of-Life. m0n0wall is a project aimed at creating a complete, embedded firewall software package that, when used together with an embedded PC, provides all the important features of commercial firewall boxes (including ...
Small and mid-size offices can now enjoy the benefits of advanced communications without big-business costs. The MKC Networks 7000 Integrated Communications Server (ICS) provides all the voice and data networking features required to improve your ability ...
Use your Palm OS device's Internet connection to HotSync, access intranet email or web servers, remotely control your PC or perform any other local network enabled task. Mergic? VPN allows you to securely access a private network, such as your corporate ...
Virtual Private Networking (VPN) enables businesses to deliver secure, encrypted connectivity for traveling employees, remote offices, and telecommuters who require access to critical corporate network resources like e-mail, network drives, and intranet r ...
When you?re away from your office but need to keep connected to your company?s private network, Tiger has you covered. It includes a built-in VPN client that supports the latest industry standards, such as L2TP and 802.1x. Just enter your account and serv ...
Robust networking services in Mac OS X Server make it a snap to set up and manage your IP infrastructure, including the latest versions of DNS, NAT, DHCP, NTP, Firewall and VPN.
Our server is ready to send traffic to your computer. You may select either of two methods. If you would like to simply generate some event traffic on your computer to test the event notification dialog and see some events in the log choose the simple pro ...