Skip to main content

Directory: Random Listings 

Results 61 - 80 of 1235
VSS Monitoring
Commercial

The vBroker Series provides you with flexible yet advanced network visibility by accessing, optimizing, and delivering traffic from multiple networks to multiple network monitoring and security tools – both passive and active (inline). Featuring both fix ...

Category Network Taps
VSS vBroker Series
TechnoLogismiki
Freeware

Hackman 7 is a freeware hex editor and disassembler. It comes with cryptography capabilities, decoding with ready and self-made algorithms and a fully-featured editor. You can edit virtually any file, disk, ZIP drive, Ram Drive, Smart Media, Compact Flash ...

Category Forensic Tools
Hackman
London Metropolitan University
Open Source

3 years Full Time

University of Northampton
Open Source

2 years Full Time

Ivanti
Commercial

Ivanti Security Controls simplifies security with unified and automated prevention, detection, and response techniques that target your biggest attack vectors. It provides OS and application patch management, privilege management and whitelisting. Detect ...

Ivanti Security Controls
Veracode, Inc.
Service

Veracode's automated web security scanning, also known as dynamic analysis or black-box testing empowers companies to identify and remediate security issues in their running web applications before hackers can exploit them. By testing web security in a ru ...

Zynamix GmbH
Commercial

Do you need to analyze multiple variations of essentially the same program ? Do you need to understand the changes between two versions of a program ? Are you trying to detect code theft ? SABRE BinDiff uses a unique graph-theoretical approach to allow co ...

Category Forensic Tools
Elcomsoft Co. Ltd
Commercial

Elcomsoft Phone Password Breaker enables forensic access to password-protected backups for smartphones and portable devices based on RIM BlackBerry and Apple iOS platforms. The password recovery tool supports all Blackberry smartphones as well as Apple de ...

Category Forensic Tools
Phone Password Breaker
Naval Research Laboratory
Commercial

The Network Pump is a Cross Domain Solution (CDS) providing network domain separation through a failsafe and redundant security architecture. It performs high assurance validation, inspection, sanitization, and/or transliteration, as required, per data fl ...

Category Data Diodes
InMon Corp
Commercial

Traffic Sentinel makes use of embedded instrumentation within switches, routers, load balancers, and servers. Industry standard sFlow provides the richest information, greatest scalability, and is supported by the largest number of vendors (see sFlow Capa ...

Traffic Sentinel
code bt_audit

small bluetooth audit suit containing psm_scan, rfcomm_scan and a script for generating database entries for btdsd

Microsoft Corp.
Freeware

Windows Firewall is a built-in, host-based, stateful firewall that is included in Windows Vista, Windows Server 2008, Windows XP with Service Pack 2 and later, and Windows Server 2003 with Service Pack 1 and later. Windows Firewall drops incoming traffic ...

Turner and Sons Productions Inc.
Commercial

If2k-Only V2.3.0    Security matters ! Lockout adware, spyware, unauthorized downloads, viruses, p2p activity, pornography, legal liabilities -lockout everything except what you determine you want ! The future of your business will depend upon ...

Category Uncategorised
Internet Filter if2k
Kingston University
Open Source

3 years Full Time

MiTec
Freeware

Viewer for standalone files containing Microsoft Outlook Express 4,5 and 6 message database (*.idx/*.mbx/*.dbx), Windows Vista Mail/Windows Live Mail and Mozilla Thunderbird message databases as well as standalone EML files. This application is based on ...

Category Forensic Tools
Mail Viewer
Open Source
Freeware

Packet filtering is the selective passing or blocking of data packets as they pass through a network interface. The criteria that pf(4) uses when inspecting packets are based on the Layer 3 (IPv4 and IPv6) and Layer 4 (TCP, UDP, ICMP, and ICMPv6) headers. ...

Pf - OpenBSD packet filter

Computers are now available anytime, anywhere, by different means, and distributed unobtrusively throughout the everyday environments in which physical objects/artifacts embedded with invisible computers are sensible and networked locally and globally. Su ...

Net-Security Training
Commercial

The CREST penetration testing course takes students of varying IT experience levels and re-skills them so that they can enter the industry not as a trainee but as qualified Penetration Tester making them productive from day one. This is an Accredited CRES ...

Category Ethical Hacking
CREST Registered Penetration Tester
Coventry University
Open Source

4 years Sandwich Course

University of Abertay
Open Source

4 years Full Time