Directory: Random Listings
The vBroker Series provides you with flexible yet advanced network visibility by accessing, optimizing, and delivering traffic from multiple networks to multiple network monitoring and security tools – both passive and active (inline). Featuring both fix ...
A web application penetration testing tool that can extract data from SQL Server, MySQL, DB2, Oracle, Sybase, Informix, and Postgres. Further, it can crawl a website as a vulnerability scanner looking for sql injection vulnerabilities. Features ...
This is a Linux driver for wireless LAN cards based on Intersil's Prism2/2.5/3 chipset. The driver supports a so called Host AP mode, i.e., it takes care of IEEE 802.11 management functions in the host computer and acts as an access point. This does not r ...
modusGate is an on-premise email security gateway with a sophisticated multi-layered anti-spam solution. It incorporates state of the art real-time machine learning to effectively identify threats by reputation and advanced statistical models, harnessing ...
4 years Sandwich Course
ntopng is the next generation version of the original ntop, a network traffic probe that shows the network usage, similar to what the popular top Unix command does. ntopng is based on libpcap and it has been written in a portable way in order to virtually ...
Install Comodo AntiSpam for free and reclaim your inbox. Our unique Passcode technology authenticates the sender of every mail a system that automated spam bots can't get around. There simply isn't a stronger spam defense available today. A ...
Forensic Explorer analysis software. Suitable for new or experienced investigators, Forensic Explorer combines a flexible and easy to use GUI with advanced sort, filter, keyword search, data recovery and script technology. Quickly process large volumes o ...
The Complete Remote Access VPN * Multiple access methods to securely connect to your email, files and applications * Enterprise-class features with simple deployment and unparalled ease-of-use * Installs on existing server without having ...
IPSEC is Internet Protocol SECurity. It uses strong cryptography to provide both authentication and encryption services. Authentication ensures that packets are from the right sender and have not been altered in transit. Encryption prevents unauthorised r ...
This five-day course is designed for computer security incident response team (CSIRT) technical personnel with little or no incident-handling experience. Through interactive instruction and practical exercises, the course provides insight into the type an ...
PMDump is a tool that lets you dump the memory contents of a process to a file without stopping the process. This can be useful in a forensic investigation.
Androguard (Android Guard) is a tool written in python to play with : .class (Java virtual machine) .dex (Dalvik virtual machine) APK (Android application) JAR (Java application) Android's binary xml Androguard has the following ...
OSSIM provides all of the features that a security professional needs from a SIEM offering – event collection, normalization, and correlation. Established and launched by security engineers out of necessity, OSSIM was created with an understanding of the ...
This product controls network management traffic as it passes between the enterprise networks and the management system. Its self-defending architecture means it can exert the required control without itself becoming vulnerable to attack. Feature ...
We created SPAM Filter ISP to implement what many SMTP servers lack: Spam Filtering. SPAMFilter ISP's implementation is very simple. Its use is designed for ISPs and companies running their SMTP servers, not end-users. SPAM Filter ISP is designed to be a ...
Unicornscan is a new information gathering and correlation engine built for and by members of the security research and testing communities. It was designed to provide an engine that is Scalable, Accurate, Flexible, and Efficient. It is released for the c ...
With a 25-year record of providing high-assurance security solutions to the federal government and the most demanding commercial enterprises, SafeNet is a proven industry leader you can trust to provide remote access to your more sensitive data. SafeNet?s ...
3 years Full Time
Verify connectivity to a particular device on your network. Quantitatively test data connections between your computer and a remote system. Trace the path to a network host or device. Obtain information on host names and IP addresses. Scan your ne ...