Corporate Security Software

12/12/2017 08:18 AM
Cain & Abel
Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort. It covers some security aspects/weakness present in protocol's standards, authentication methods and caching mechanisms; its main purpose is the simplified recovery of passwords and credentials from various sources, however it also ships some "non standard" utilities for Microsoft Windows users. Cain & Abel has been developed in the hope that it will be useful for network administrators, teachers, security consultants/professionals, forensic staff, security software vendors, professional penetration tester and everyone else that plans to use it for ethical reasons. The author will not help or support any illegal activity done with this program. Be warned that there is the possibility that you will cause damages and/or loss of data using this software and that in no events shall the author be liable for such damages or loss of data. Please carefully read the License Agreement included in the program before using it. Tag:password recovery password recover recover password password encryption encrypt password password decoder password calculator Microsoft Operating Systems network VoIP conversations SSH-1 HTTP APR Arp Poison Routing system security cryptanalysis
12/12/2017 08:18 AM
Bulletproof Public PC
Bulletproof Public PC is a comprehensive solution you can use to produce public PC and kiosk desktop terminals that are intended to work without supervision. Completely disable access to the local files and give the full access to the necessary applications only. Create a PC workstation to be used safely under an uncontrolled public environment and prevent your workstations from damaging and cluttering. Control access to the applications installed on your PC workstations; allow using Internet Explorer, for instance, and disable all other software. Bulletproof Public PC is good for public libraries, Internet cafes, online terminals and in-store kiosks. Bulletproof Public PC has a lot of custom features you can use to fine-tune access to a locked desktop. User profiles and time-locked codes are also supported to allow selected users to access workstation for a given period of time only. This software has a very easy-to-use user interface. Tag:workstation Windows 98 Windows 2000 Windows XP Windows NT Windows Me Windows 2003
12/12/2017 08:18 AM
USB Manager
USB Manager is a small Windows utility that can quickly enable and disable USB devices. It has no interface and runs from the system tray. You can control the devices from the right-click context menu. It allows users to control USB devices such as, storage, printers, scanners, audio, and other devices. It can also be used to lock a device. Suppose you want to disable printing, scanning, or a storage device, first disable it and then go to options to password protect the settings. This can in fact be very useful. If you have a computer in office workspace and are worried that someone might copy a file then you can disable storage devices and password protect it. Once done, all USB inserted in your computer will fail to work. There is also an option to enable hotkey, start with windows, and hide it from the system tray. Tag:microsoft picture manager bluetooth usb driver adobe download manager office picture manager picture manager repair usb drive usb traffic sniffer
12/12/2017 08:18 AM
Wireless Protector Enterprise
Wireless Protector is windows based management and security software that automatically disable WiFi adapters on computers that connected to the company network LAN and re-enable WiFi when the LAN cable is disconnected from the wireless computers. The Enterprise version supports unlimited wireless computers. Wireless Protector is acting as a server to all protected wireless computers and it needs to be installed only once on any active windows platform that connected by LAN cable to the company network. The software powerful engine can run as windows program or windows service and protect any number of wireless computers by installing a remote service on the wireless computers. It is also monitoring the protected wireless computers for active wireless auto switch protection. The software provides easy-to-use network administration interface, reports, exporting capabilities and database support. The software also collect activity logging on disabled WiFi adapters and protection status events for the wireless computers that helps network administrators to track and maintain the software activity. Wireless Protector key features: Provides wireless auto switch protection. Automatically disable WiFi when connected to LAN network. Automatically re-enable WiFi when LAN cable disconnect from network. Prevent WiFi network computers from using duplicate network resources. Secure un-trusted WiFi connections from being used as bridge connections. Enables automatic active protection re-scanning on WiFi network computers. Enables automatic exporting capabilities to text file or SQL/Access ODBC databases. Provides easy-to-use network administration interface. Provides enhanced statistics and reports. Provides activity logging tracking. Tag:network lan wireless computers protection monitor automatic disable wifi adapters windows
12/12/2017 08:18 AM
DiskPulse Server
DiskPulse Server is a powerful and easy-to-use disk change monitoring server allowing one to monitor one or more disks or directories and detect file creations, modifications, name changes and delete operations in real-time. DiskPulse Server runs in the background as a service and may be controlled locally or remotely through the network using a client GUI application or a command line utility. Tag:Disk Change Monitor File System Monitor
12/12/2017 08:18 AM
Security Curator
Security Curator 5.2.1041 is designed to be a useful and flexible corporate security software that allows you to monitor activities on company computers and prevent unauthorized distribution of sensitive corporate information. Corporate information security has always been one of the top business priorities. There is a growing need for solutions providing functionality to analyze activities of employees during business hours and protect confidential information of the company. StaffCop software allows you to effectively prevent, detect, respond, monitor and review measures to reduce perceived risks of corporate data loss. IT professionals who use StaffCop can adequately monitor company resources for data breaches or prevent these breaches from occurring. Major Features: Social Network monitoring and control Search Term monitoring (searching in such search engines) Screenshot recording Application monitoring E-mail correspondence monitoring Web site monitoring Keystroke recording File and folder tracking Chats/IM activity recording USB device monitoring Printers monitoring Clipboard monitoring User log recording PC activities reporting Stealth mode installation and monitoring Alert notifications Tag:security curator activity monitoring employees
12/12/2017 08:18 AM
HexMe
A handy, easy to use application specially designed to offer users a straight forward hex editor. Basically a hex editor is the application that allows a user to manipulate the fundamental binary data that makes up computer files. Tag:hex editor easy to use y data computer file computer files hex edit
12/12/2017 08:18 AM
Master Voyager
Master Voyager has been specially designed to create protected DVD/CD discs and USB memory sticks. It creates protected areas on media and requires a password to see the protected contents. Protected discs/USB sticks are fully autonomous and do not need any special software to be installed. The program uses strong encryption to protect your data. The 256-bit Advanced Encryption Standard (AES) is the new Federal Information Processing Standard (FIPS), used even by the U.S. government (and others) to protect sensitive information. Embedded CD/DVD burning module. CDR/CDRW/DVD+-R/DVD+-RW disc types are supported. You do not need to buy special CD burning software. No need to have Master Voyager software on a computer to read protected media. Each protected disc/USB stick contains an AutoPlay module. Just insert the disc into a CD drive (or connect your flash stick to a USB port) and it will ask for the password to continue. The only requirement is to have Windows Vista/XP/2000 (32- or 64-bit) and a CD-ROM/USB port. Protected media do NOT install any software to the target computer. They are fully autonomous. Download and try out a 30-day evaluation version free of charge! Tag:dvd cd rw usb protect password encrypt encryption aes strong mobile
12/12/2017 08:18 AM
ROT-13 Encryption/Decryption
This is a ROT-13 Encryption/Decryption Program made by me. It uses the ROT-13 algorithm to encrypt messages;which is very basic. You can use this app to send encrypted messages to your friends and decode them too. Features: •ROT-13 Encryption •ROT-13 Decryption •Copy to Clipboard •Full Gui •Capital Alphabets support Tag:corel draw 13 spss 13.0 spss 13 dvd encryption dvd encryption software folder encryption rc4 encryption algorithm b bios 1.13 decryption tool
12/12/2017 08:18 AM
HT System Administrator
System Administrator is a managing computer tool recommended to employers, schools and universities. System Administrator helps employers prevent wasting work time and improve their employees' productivity and discipline by banning access to non-work related activities. It blocks unwanted PC activities and prevents computer system damage by unskilled users. System Administrator can block programs, instant messengers, games, chats, websites, browsers etc. The program contains a powerful internet filter which can block inappropriate content such as Myspace, Facebook, Twitter and others. Key features: Block Applications System Administrator allows you to block any program from launching on the computer. It can be extremely useful for employers who want to prohibit applications that help waste time on the computer. One of the biggest problem applications for employers and parents are games. System Administrator can block games in a simple way and even the most computer-savvy users cannot revert the prohibition. Block Browsers Want to limit internet usage? Internet Explorer, Firefox, Opera, Google Chrome, and other browsers can be blocked by using System Administrator. It does not matter to System Administrator what kind of browser and version you want to block. The program has no limitation on browser blocking. Block Instant Messengers Instant messengers can take a lot of the employee's or the student's time. System Administrator can restrict access to instant messengers such as Windows Live Messenger, AIM, ICQ, Yahoo messenger and others. Block MySpace or Facebook Facebook and Myspace are popular social networking sites which can take up hours of your employee’s time. These sites are time wasters which can cost businesses millions of dollars. With just two clicks of the mouse, Myspace and Facebook and all associated pages can be locked on the computer prohibiting the user to access the websites. Tag:system administrator restrict access block websites block website block myspace block facebook block program block application internet filter
12/12/2017 08:18 AM
Passware Kit Enterprise
Reduce time spent on recovering passwords and get more control over corporate security. Key Features: * All 30+ password recovery modules and Encryption Analyzer now combined in an all-in-one user interface * Includes 5 Decryptum Credits for instant online decryption of MS Word and Excel files (up to version 2003) * Multiple-core CPUs are now efficiently used to speed up the password recovery process * 8 different attack types (and any combination of them) could be set up using a wizard or drag & drop attacks editor * Multiple nVidia GPUs (where available) can be used to accelerate MS Office 2007 password recovery speed by 3500% *Tableau TACC hardware accelerators are used to speed up the password recovery process by up to 25 times New! * All recovered passwords are saved and ready to be reused on other files * 30-day money-back guarantee Benefits for IT Professionals * This complete password recovery solution provides corporate security administrators with the full control over employees’ computers and files. System administrators, IT professionals and help desk personnel can now get access to any business file whenever required. Many types of passwords are recovered or reset instantly, while advanced acceleration methods are used to recover difficult passwords. Tag:office 2007 ms office deep freeze enterprise swift kit
12/12/2017 08:18 AM
MIMEDefang
MIMEDefang is an e-mail filtering tool that works with the Sendmail "Milter" library. MIMEDefang lets you express your filtering policies in Perl rather than C, making it quick and easy to filter or manipulate your mail. MIMEDefang is mature software: The first version was released in 2000. It's also in use in thousands of installations. MIMEDefang is under active development; it forms the basis of our CanIt commercial anti-spam product. MIMEDefang is free software: It's released under the terms of the GNU General Public License. It runs under Linux, FreeBSD, Solaris and most other UNIX or UNIX-like systems. Tag:free soft free softwar t com e-mail filter mail filtering mail filter e-mail filtering
12/12/2017 08:18 AM
StaffCop
StaffCop 4.0.143 is designed to be a useful and flexible corporate security software that allows you to monitor activities on company computers and prevent unauthorized distribution of sensitive corporate information. Corporate information security has always been one of the top business priorities. There is a growing need for solutions providing functionality to analyze activities of employees during business hours and protect confidential information of the company. StaffCop software allows you to effectively prevent, detect, respond, monitor and review measures to reduce perceived risks of corporate data loss. IT professionals who use StaffCop can adequately monitor company resources for data breaches or prevent these breaches from occurring. Major Features: Social Network monitoring and control Search Term monitoring (searching in such search engines) Screenshot recording Application monitoring E-mail correspondence monitoring Web site monitoring Keystroke recording File and folder tracking Chats/IM activity recording USB device monitoring Printers monitoring Clipboard monitoring User log recording PC activities reporting Stealth mode installation and monitoring Alert notifications Tag:staffcop activity monitoring employees
12/12/2017 08:18 AM
The First Administrative Package
• Get The Most Of Your Employees Using The First Administrative Package. • Control Your Clients And Save Your bandwidth. • Disable Certain Drive , Program Or Future On The Client Computer. • Do Administrative Tasks Locally Without Need To Buy A Server Or A Domain Controller. • Administrate Your Network Computers Without Need Of Any Network knowledge. • No Need To Install Or Setup Just Burn The Iso Image To CD. • Not Appears In The Start Menu Or Add Or Remove Programs. • With The Full Version You Can Do The Following: - Disable \ Enable All Drives - Disable \ Enable Drive C - Disable \ Enable Drive D - Disable \ Enable USB Flash Drives - Disable \ Enable LimeWire - Disable \ Enable BitComet - Disable \ Enable Download Accelerator Plus - Disable \ Enable Firefox - Disable \ Enable Internet Explorer Download - Disable \ Enable Control Panel - Disable \ Enable Delete Browsing History - Disable \ Enable Folder Options - Disable \ Enable Internet Explorer Options - Disable \ Enable Run From The Start Menu - Disable \ Enable System On The Control Panel - Disable \ Enable Task Manager - Disable \ Enable Google Earth - Disable \ Enable Skype - Disable \ Enable Windows Messenger & Live Messenger - Disable \ Enable Yahoo Messenger Only - Disable \ Enable Folder Options Is Available In This demo Version Tag:
12/12/2017 08:18 AM
ServerDefender VP
Secure your web server against SQL injection, cross-site scripting, and other malicious attacks. What SDVP Does: Prevent major attacks without signatures SDVPs request management is about scrutinizing the incoming data whether it is GETs or POSTs. SDVP applies a set of configuration controls behind the scenes which is completely customizable to fit your security needs. SDVP is designed to block SQL injections, XSS attacks, and more... right "out of the box". Harden sessions against hijacking, CSRF, and more SDVP applies security policy directly to session state by setting its own session and monitoring cookies. Don't have issue of orphaned sessions that could then become points of attack and vulnerability. Site awareness at a glance Be immediately aware of what is going on your site. SDVP provides active monitoring with an easy to read summary of common attack types and your current site status. SDVP allows for HTTP traffic monitoring and real-time analysis with little or no changes to existing infrastructure. Highly customizable security policies Eliminate false positives. Set exceptions directly in SDVP's LogViewer. Ability to create an exception string for just URL and field. Mask sensitive data fields for regulatory compliance With SDVP's advanced reporting and LogViewer, vulnerabilities can be detected, communicated and corrected. SDVP's extensive logging tool allows you to identify vulnerabilities and blocked requests with full details. Provides real-time reporting with detailed information such as time and date, attack type, source, reason blocked, and more. Tag:traffic monitor sql injection g data vp-eye vp eye software vp eye drivers vp eye 3.0 time report web server behind the scene xss attacks site script session state highly customizable sql in vp teamwork server
12/12/2017 08:18 AM
TqcRunas
TqcRunas makes possible to execute runas commands from a strongly encrypted file where all the needed specifications are stored, allowing administrators to launch runas commands from scripts in an easy and secure way. New features in TqcRunas 2007.1 Edition include: * The GUI of TqcRunas is now a document oriented interface. * TqcRunas documents (.tqc files) can be edited by it's creator. * Ability to use the current logged on user's registry profile in the executed application. * Mapped drives and printers in the current logged on user session will be automatically mapped and available in the executed program. * Many settings have been included to control the behavior of the executed program. * Ability to use digital certificates to double encrypt the runas settings. * Now is possible to pass arguments to the encrypted file. * TqcRunas is now only one module: TqcRunas.exe Tag:PDF Adobe Acrobat password decrypt recovery crack encrypted Password Recovery pdf password protection security
12/12/2017 08:18 AM
Deep Freeze Enterprise
Deep Freeze Enterprise instantly protects and preserves baseline computer configurations. No matter what changes a user makes to a workstation, simply restart to eradicate all changes and reset the computer to its original state - right down to the last byte. Expensive computer assets are kept running at 100% capacity and technical support time is reduced or eliminated completely. The result is consistent trouble-free computing and a dramatic increase in computer uptime. While Deep Freeze Enterprise provides bulletproof protection, its non-restrictive approach also improves user productivity and satisfaction. By placing no restrictions on a user's ability to access all system resources, users avoid the frustration of downtime due to software conflicts, operating system corruption, misconfiguration, and many other problems. Users are always assured of computers that are consistently operable and available. This edition of Deep Freeze Enterprise can be deployed and controlled with Apple Remote Desktop (ARD) or the LANDesk Management Suite console. Absolute Protection Guarantees 100% workstation recovery on restart Provides password protection and complete security Protects multiple hard drives and partitions Configuration Options Supports multi-boot environments Customize user name and password Choose whether the Deep Freeze icon will appear in the menu bar Choose whether the hard drive icon will appear with the Deep Freeze badge Localized in English, French, German, Spanish and Japanese Update feature checks for newer Deep Freeze Mac versions Control and Flexibility Retain User Data Integration and Compatibility Dual-Boot Support Tag:deep freeze deep freeze 6 anti deep freeze uninstall deep freeze deep freeze 2000xp remote desktop operating system enterprise development
12/12/2017 08:18 AM
Active Directory Report Software
Active Directory Report Software (ADRS) provides administrators with insight at a glance into the number of Active Directory user accounts and their status. ADRS counts the number of user accounts per Organizational Unit (OU) or per domain and offers an overview of disabled, enabled and stale user accounts. ADRS queries the Active Directory and directly displays the results on the screen. Windows does not offer any convenient method for quickly gaining insight into the number of user accounts in Active Directory. ADRS allows you to determine the exact number of enabled and disabled user accounts in Active Directory as well as the number of stale accounts. These accounts can subsequently be removed to prevent the unnecessary purchase of licences for such users. Key benefits A clear overview - With a simple click of a button, administrators are presented with the number of Active Directory user accounts per OU or domain. Windows does not offer any default application for this. License management - Administrators can get an overview of the number of user accounts in Active Directory in a very simple way. This will allow them to remove outdated accounts to prevent unnecessary license costs. Key features Configuration of stale accounts - ADRS offers administrators the ability to configure the number of days that determines an unused account has become a stale account. Export - Query results can be exported to a CSV file. Log files - ADRS logs every single user action. Tag:Report Reporting software Active Directory User Accounts Licensing Stale Enabled User Accounts Disabled User Accounts Identity Management User Provisioning Workflow Management RBAC
12/12/2017 08:18 AM
Belkasoft Forensic Studio
Tool for forensic professionals that eases their work on analysing Internet Messengers histories, Browsers histories and Outlook mailboxes. Supported Instant Messengers: ICQ versions from 97a up to ICQ 6, MSN Messenger, Yahoo! Messenger, &RQ, Miranda, Skype, MySpace IM, SIM, QIP, AIM. Supported browsers: Microsoft Internet Explorer, Mozilla Firefox, Opera. Supported Outlook versions: 2003, 2007. No password required. No need to be logged as history owner. No need to have messenger/browser/mail software installed. Search is supported - simple search by word or phrase and advanced search using file with suspect word or using regular expression which is very useful when searching a various word's forms or phrase with fuzzy structure. The product can search installed messengers and history files on your computer as well as on mapped network drives (including Encase mapped drives). Thus you will find history files even in case you haven't installed messenger. It is possible to work with several histories at a time. Per-session bookmarks are supported. Belkasoft Forensic Studio allows you to extract your IM history into such formats as plain text, HTML and XML. Tag:Belkasoft forensic studio IM browser Outlook &RQ MSN Yahoo! Skype MySpace AIM QIP SIM Internet Explorer Opera Firefox Mozilla history message
12/12/2017 08:18 AM
Anti-Executable
Faronics Anti-Executable protects workstations from unwanted software by preventing unauthorized executables from running. Anti-Executable ensures workstation integrity by scanning the entire workstation hard drive and creating a whitelist of all programs that are authorized for use, thereby preventing applications that are not on the list from executing or installing. By using Anti-Executable, organizations can provide users with the productivity tools required for their job, but protect them from distractions, such as chat programs and games, and Internet dangers, such as spyware, malware, rootkits and adware. Advanced features include the ability to shutdown or restart computers, block keyboard and mouse activity, and centralized control over workstation protection settings. Tag:antiexecutable application control program control whitelist white list unwanted unauthorized block lockout









©2017 v263.net, All rights reserved. Contact us.