Directory: Random Listings
3 day practical computer forensics training course - Learn about forensic principles, evidence continuity and methodology to employ when conducting a forensic investigation. Using practical case scenarios, you will be guided through the process ...
Kernel Exhcnage EDB Viewer is an Exchange Mailbox viewer tool, that assists system administrators in opening EDB files even in the absence of MS Exchange Servers. Now recover your corrupt exchange database files for free and review their entire contents ...
AppWall - Radware’s Web Application Firewall (WAF), ensures delivery of mission-critical Web applications and APIs for corporate networks and in the cloud. AppWall is a WAF that combines positive and negative security models to provide complete protection ...
FlowNBA is a complete solution for network monitoring based on NetFlow/IPFIX. Thanks to the used technology it enables complete overview of the network traffic, detailed information about all communications and provides information about who communicates ...
SpotBugs is a program which uses static analysis to look for bugs in Java code. SpotBugs is capable of checking for more than 400 bug patterns and can be used standalone or through many integrations including: Ant, Maven, Gradel, Eclipse.
Designed for any Mail Server running on a Windows platform, and combining advanced content filtering technologies with antispam features it offers proactive protection of message traffic against viruses, Trojans or other potentially malicious code. As a r ...
KerioControl is a next-generation firewall and unified threat management product for small and medium-sized businesses (SMBs). With KerioControl, businesses gain:A firewall that connects you to the internetIntrusion protection that monitors trafficWeb con ...
McAfee Policy Auditor helps you report consistently and accurately against key industry mandates and internal policies across your infrastructure or on specific targeted systems. Policy Auditor is an agent-based IT audit solution that leverages the Securi ...
The TippingPoint IPS is an in-line device that is inserted seamlessly and transparently into the network. As packets pass through the IPS, they are fully inspected to determine whether they are legitimate or malicious. This instantaneous form of protectio ...
ACNS is an annual conference concentrating on current developments that advance the areas of applied cryptography and its application to systems and network security. The goal is to represent both academic research works as well as developments in industr ...
The Annual Computer Security Applications Conference (ACSAC) is an internationally recognized forum where practitioners, researchers, and developers in information and system security meet to learn and to exchange practical ideas and experiences. If you a ...
The SecurityTube Linux Assembly Expert, or SLAE, is an online course and certification which focuses on teaching teh basics of 32-bit assembly language for the Intel Architecture (IA-32) family of processors of the Linux platform and applying it to infose ...
The gun, which is called the BlueSniper rifle, can scan and attack Bluetooth devices from more than a mile away.
The Viasat Eclypt Freedom is an encrypted, portable drive that gives fast access to secure data. Accredited by government organizations around the world to protect important data, the Eclypt Freedom uses advanced hardware-based full disk encryption. In t ...
The Internet's quickest, most popular, reliable and trusted, free Internet security checkup and information service. And now in its Port Authority Edition, it's also the most powerful and complete. Check your system here, and begin learning about using th ...
Zscaler Data Loss Prevention protects your confidential information and intellectual property by inspecting all of your outbound Internet traffic, including SSL-encrypted traffic, and helps you meet industry, statutory and regulatory compliance standards ...
The BrightCloud IP Reputation Service helps enterprise customers augment their defenses by adding a dynamic IP reputation service. Through a continuously updated feed of known malicious IP addresses, IT security administrators can easily identify threats ...
The SonicWALL Content Security Manager Series (CSM), featuring the 2200 and 3200 models, is an appliance-based gateway security and content filtering solution that integrates real-time gateway anti-virus, anti-spyware and intrusion prevention to deliver m ...
NETASQ VPNs guarantee protection by encrypting all your information as soon as it is sent over your network.