|
Advanced
Administrative Tools
Have you been port scanned lately?
Completely ignoring network security is not
smart and ignorance isn't exactly bliss. If
you access the Internet via a cable modem, DSL,
or even a dial-up connection, someone is always
knocking on your virtual front door, giving
your system the once-over. Protect your data,
privacy and valuable computer system with AA
Tools. AATools investigates and gathers information
about your computer, network status, and service
availability. That is a layman's way of saying
it performs an inspection on everything vital
to network security as it pertains to the protection
of your computer, including the utilization
of tools to check open ports, proxies, email
lists, Internet applications, and general system
information.
|
|
----------------------------------------------------------------------------------------------------------------------
|
xSharez
Scanner
A powerful tool for both network
administrators and users interested in the network
security issues. Audit B and C classes networks
for the shared resources availability. Get an
in-depth information about scanned computers.
Generate advanced HTML and CSV reports and analyze
the network security level.
|
|
----------------------------------------------------------------------------------------------------------------------
|
NetCop
advanced spyware detection system
available anywhere. Your privacy is worth the
protection NetCop has to offer! Netcop has a
distinct method of classifying spyware that
is added to our detection routine. Some of these
programs that invade your privacy have very
different capabilities. NetCop categorizes these
threats by giving each program a threat level.
|
|
----------------------------------------------------------------------------------------------------------------------
|
7Safe
7Safe's Express Security Assessment
(ESA) is a service comprising a vulnerability
assessment of your Internet-facing machines.
It allows you to deal with vulnerabilities before
an unwanted intruder does. The ESA is conducted
across the Internet from our offices, thus no
on-site presence is required. Following the
assessment, a report is produced that focuses
on vulnerabilities found in order of priority,
in managerial and technical formats together
with suggested remedies.
|
|
----------------------------------------------------------------------------------------------------------------------
|
McAfee
Personal Firewall
Beware of hackers! Personal Firewall
helps block hacker access to your personal and
financial information and gives you complete
visibility over everything in and out of your
computer.
Every time your system is probed or attacked,
a more common event than most would expect,
you get detailed reports and clear options to
follow up. Seamless integration with the new
SecurityCenter provides you with an easy-to-read
security status, access to up-to-the-minute
security alerts and automatic software updates.
|
|
----------------------------------------------------------------------------------------------------------------------
|
PortBuster
watches the TCP/IP ports of your computer
and blocks incomming connections of trojans,
spy tools, hackers and other connections from
the Internet or LAN. The port agent knows most
dangerous ports that are used by hacker software
to break into your machine on the Internet.
For a high level of security let the agent block
these attacks
|
|
----------------------------------------------------------------------------------------------------------------------
|
OutPost
Firewall Pro
There has been a major increase of home
computer attacks. It appears that with the increase
of high speed Internet access, little knowledge
of security by users, and a smaller chance of
being prosecuted, home computers have become
tasty targets for hackers. Our goal is to even
the board!
|
|
----------------------------------------------------------------------------------------------------------------------
|
ProxyPass
an integrated solution to combat
many different types of password hack attempts.
ProxyPass is solely a subscription service and
runs as a client-server software system. Just
like the ProxyGuard before it, ProxyPass is
fully supported, and monthly subscriptions are
available through Danube Technologies, Inc.
ProxyPass is a client-server system, where a
client software is installed on host systems.
The client software is a C module of Apache
that works to protect and bolster the generally
weak authentication structures offered by the
Apache web server.
|
|
----------------------------------------------------------------------------------------------------------------------
|
Network
Spy
Network Spy is a general purpose
diagnostic tool for administrators, programmers
and students of network technologies. It can
operate in different modes depending on the
application. Some of the more typical applications
of this tool include: Packet capture and decode
Network Statistics gathering Software debugging
Intrusion Detection and activity monitoring.
|
|
----------------------------------------------------------------------------------------------------------------------
|
Personal
Firewall
Without a firewall, your computer
is operating under an "open door" policy. Bank
account information. Passwords. Credit card
numbers. Documents and photos that you don't
want to share with the world. They are all available
to anyone with bad intentions and basic computer
skills. Hackers can get in, take what they want,
and even leave open a "back door" so they can
turn your computer into a "zombie" and use it
to attack other computers. Every minute that
your computer is connected to the Internet,
either through a dial-up (modem) connection
or through a broadband (DSL or cable) service,
it is at risk.
|
|
----------------------------------------------------------------------------------------------------------------------
|
Private
Firewall
Privatefirewall™ eliminates unauthorized
access to your PC, at home, the office, or on
the road. Privatefirewall also constantly monitors
the sensitive areas of a PC where intrusion
can occur and reports on their status allowing
users to take appropriate action. Privatefirewall
is easy to install/use and provides reliable
and high-performance protection.
|
|
----------------------------------------------------------------------------------------------------------------------
|
PortsLock
a personal firewall for Windows
NT/2000/XP that fully supports user-level security.
Once PortsLock is installed, administrators
can control which users can access what TCP/IP
based protocols (HTTP, FTP, SMTP, POP3, Telnet,
etc.) on a local computer, depending on the
time of day and day of the week.
|
|
----------------------------------------------------------------------------------------------------------------------
|
WinRoute
Pro
a robust network firewall that
protects your network from hackers and Internet
threats. It easily connects the network to the
Internet using various access devices. Built-in
mailserver allows users to have their own corporate
email.
|
|
----------------------------------------------------------------------------------------------------------------------
|
internetALERT
It will notify you if someone is breaking
into your computer, stop them dead in their
tracks, and even build a visual map showing
you the Attacker's ISP (Internet Service Provider)
location! You can now connect to the Internet
with the comfort and security of knowing that
no one from the Internet can access your computer
without your knowledge or permission
|
no photo available
|
----------------------------------------------------------------------------------------------------------------------
|
Armor2Net
Armor2net personal firewall stops
hackers and data thieves and protects your
PC from Internet-borne threats. Only one Armor2net
can meet your requirements in multi-field
of Internet security and Internet privacy.
This PC firewall monitors all Internet connections
to and from your computer to ensure that only
legitimate traffic is allowed and alerts you
to attempted intrusions. You have the option
to grant and deny access to Internet on a
per-application basis, thus preventing worm,
Trojan horse and spyware programs from hurting
your computer.
|
|
----------------------------------------------------------------------------------------------------------------------
|