Directory: Random Listings
SMART is a software utility that has been designed and optimized to support data forensic practitioners and Information Security personnel in pursuit of their respective duties and goals. The SMART software and methodology have been developed with th ...
Security in the industry for mobile operators, internet service providers, and hosting providers Cloudmark Authority utilizes a unique combination of proprietary technologies including Advanced Message Fingerprinting algorithms and real-time threat ...
Secure Office Networking from Fortinet streamlines your network without sacrificing the security, performance or functionality you need to grow. Minimize workarounds and troubleshooting with Next-Generation Firewall and SD-WAN, switches and access points ...
Belkasoft X (Belkasoft Evidence Center X) is a flagship tool by Belkasoft for computer, mobile and cloud forensics. It can help you to acquire and analyze a wide range of mobile devices, run various analytical tasks, perform case-wide searches, bookm ...
This course provides the participants with "hands-on" experience in developing and presenting computer evidence testimony in a courtroom setting. It relies upon the sanitized facts and evidence in an actual civil litigation case which involved the theft o ...
Since 1996, the NordSec workshops have brought together computer security researchers and practitioners from the Nordic countries, Northern Europe, and elsewhere. The workshop is focused on applied computer security and is intended to encourage interchang ...
Today you need to remember many passwords. You need a password for the Windows network logon, your e-mail account, your website's FTP password, online passwords (like website member account), etc. etc. etc. The list is endless. Also, you should use differ ...
btscanner is a tool designed specifically to extract as much information as possible from a Bluetooth device without the requirement to pair. A detailed information screen extracts HCI and SDP information, and maintains an open connection to monitor the R ...
2 years Full Time
The theme of the conference is the protection of computer networks. The conference will draw participants from academia and industry in Europe and beyond to discuss hot topics in applied network and systems security. Topics include but are not limited to ...
Use this service to test your firewall rules. If you intend to allow or deny connections through your firewall, you can check to see what will happen when an Internet user attempts to connect. Behind the scenes, this firewall test uses NMap to attempt to ...
As part of Trend Micro Vision One, Trend Micro Zero Trust Secure Access follows the principles of Zero Trust networking. This strengthens your overall security posture by enforcing strong access control permissions from multiple identity services across t ...
EtherApe is a graphical network monitor for Unix modeled after etherman. Featuring link layer, IP and TCP modes, it displays network activity graphically. Hosts and links change in size with traffic. Color coded protocols display. It supports Ethernet, F ...
R-Firewall is an effective and easy-to-use solution to secure your on-line activity. It protects a computer connected to a local network and/or to the Internet against any intrusions, attacks, trojans, spyware, and other external and internal threats. R-F ...
The Quantum Spark Next Generation Firewalls for small and medium size businesses, feature best-in-class threat protection, are easy to deploy and manage, and integrate communication and security into an “all in one” security gateway solution. Quantum Spa ...
The Windows Identity Foundation helps simplify user access for developers by externalizing user access from applications via claims and reducing development effort with pre-built security logic and integrated .NET tools.
CommView is a powerful network monitor and analyzer designed for LAN administrators, security professionals, network programmers, home users…virtually anyone who wants a full picture of the traffic flowing through a PC or LAN segment. Loaded with many use ...
Security Center network access protection software designed to provide real-time network security monitor for intrusion detection IDS and prevention IPS that helps to protect networks from being vulnerable to unauthorized network connections, malicious ne ...
MiniStumbler is a tool for Windows CE that allows you to detect Wireless Local Area Networks (WLANs) using 802.11b, 802.11a and 802.11g. It has many uses: * Verify that your network is set up the way you intended. * Find locations with poor co ...
The Network Pump is a Cross Domain Solution (CDS) providing network domain separation through a failsafe and redundant security architecture. It performs high assurance validation, inspection, sanitization, and/or transliteration, as required, per data fl ...