Directory: Random Listings
WEPCrack is an open source tool for breaking 802.11 WEP secret keys
TEF is a fully-featured, secure and has advanced capabilities including the intuitive Xsentry easy-to-use administration graphical user interface with WYSIWYG (What You See Is What You Get) front end which has drag and drop security policy deployment.
The VADO One Way SecureCross Domain appliance, is a fiber optic-based channel, allowing unidirectional flow of data from public networks to secure networks while data flow in the opposite direction is physically impossible. Since the security is based on ...
Android Antivirus Once installed, it runs silently to protect you from the latest viruses, malware, spyware, unsafe apps and settings, and other nasty threats. Anti-Theft Phone Tracker Just visit our Anti-Theft website from another de ...
PMDump is a tool that lets you dump the memory contents of a process to a file without stopping the process. This can be useful in a forensic investigation.
4 years Full Time
Arkime (formerly Moloch) is an open source, large scale, full packet capturing, indexing and database system. A simple web interface is provided for PCAP browsing, searching, and exporting. APIs are exposed that allow PCAP data and JSON-formatted ses ...
Utilikilts offers a total of 6 different models Standard Models: The Mocker The Spartan The Workman The Survival Special Offerings or Limited Run Offerings: The Tuxedo The Beast (Leather)
Computers are now available anytime, anywhere, by different means, and distributed unobtrusively throughout the everyday environments in which physical objects/artifacts embedded with invisible computers are sensible and networked locally and globally. Su ...
OSSIM provides all of the features that a security professional needs from a SIEM offering – event collection, normalization, and correlation. Established and launched by security engineers out of necessity, OSSIM was created with an understanding of the ...
Intrusion Prevention System (IPS) for ssh (default port 22), this IPS responds to the suspicious activity by setting the linux firewall (iptables) to block network traffic from the suspected malicious source. Suspicious activity is determined via auth or ...
KNOPPIX is a bootable CD with a collection of GNU/Linux software, automatic hardware detection, and support for many graphics cards, sound cards, SCSI and USB devices and other peripherals. KNOPPIX can be used as a Linux demo, educational CD, rescue syste ...
4 years Full Time
EMP Cloud substantially expands the former EMP on-premise feature set. Also, it will protect both on-premise email servers, as well as cloud based services such as Office 365 and Gmail.
4 years Sandwich Course
16 months Full Time
Protect your business Endpoints today against ransomware, malware, hackers and much more. Features: CyberCapture - When an unrecognized file is downloaded onto one of your PCs, a copy will be sent to our experts at our Threat Labs to identify if it’s ...
Certified Information Systems Security Professional (CISSP) is a highly sought after course by those who are looking to make a career in Information Security. Our CISSP training course - 'CISSP Fast Track' is an intensive, in-depth training program that h ...
Bitdefender is a powerful antivirus tool with features that best meet your security needs. The new and improved BitDefender scanning engines will scan and disinfect infected files on access, minimizing data loss. Infected documents can now be recovered, i ...
The Offensive Security Web Expert (OSWE) is an entirely hands-on web application penetration testing security certification. The OSWE challenges the students to prove they have a clear and practical understanding of the web application assessment and hack ...