Detect Intrusion


Advertisement

Detect-Email  v.1.0

Detect Email is an advanced email addresses harvester. It extracts email addresses from the Internet. You can determine any search criteria; it can be a domain name, a keyword or a searching engine. Detect Email's powerful engine will quickly extract ...

Blink Endpoint Intrusion Prevention  v.2.2

As the industrys first endpoint security solution to incorporate multiple layers of proven technologies, eEye Digital Securitys Blink Endpoint Intrusion Prevention solution addresses today's most pressing security challenge: preventing the attack. No ...





Advertisement

Detect Duplicates for Windows Live Mail  v.3.2

Detect Duplicates for Windows Live Mail snappily finds and cleans duplicate emails that have accumulated in Windows Mail or Outlook Express. You can filter results before having Delete Duplicates take action and compare messages across folders and set ...

Intrusion Detection Exchange Arch.  v.1.2

A Java-based client-server architecture for processing network intrusion detection data. The server receives XML alerts from Snort sensors buffers them for review by clients. The console provides a real-time view of IDS activity.

Modular Intrusion Countermeasure Env.  v.0.2

M-ICE is a modular hostbased intrusion detection framework. It is used as middleware to close the gap between IDS research and IDS development. M-ICE consists of various parts that can be connected together by using network-or interprocess-communication ...

I-Detect Community (Ginkgoware)  v.3 3

Metal Detecting Software Journal for your computer allows you to save important details of all your metal detecting adventures. Reports, printing, maps and much more. The program works with Windows 2000, XP, Vista and 7 and requires a screen resolution ...

Foundstone DIRE (Detect Insecurely  v.1.0

The ability to register applications that can then be automatically initiated by Windows is a powerful feature today that enhances the end user's experience and furthermore enables system administrators to exert complete control over the machines in their ...

Ida - Intrusion Detection for Apache  v.alpha3

Ida, is a Apache log security analyzer written in PHP. It will scan Apache logs and report about security incidents like SQL injections, XSS attacks, path traveling and so on.

VirIT eXplorer Lite  v.8.1.79


The features of VirIT eXplorer Lite are:
1) Intrusion Detection system in Real-Time;
2) Web Filter Protection for Internet Explorer
3) DEEP SCAN technology;
4) Heuristic virus scanning engine;
5) Macro Virus Analyzer;
6) ...

AdressWizard Pro  v.4.2

Scan IP addresses with SNMP, wake on LAN, port scanning and intrusion prevention. Identify active stations on the network. It shows IP and corresponding MAC addresses as well as station names and NetBios data, and SNMP information. It will inform you ...

Clam Sentinel Portable  v.1.20

The Clam Sentinel Portable application was developed as an accessible and handy piece of software that was built to detect file system changes. Clam Sentinel will automatically scan the files that have been added or modified using the ClamWin antivirus.

Clam Sentinel  v.1.20

The Clam Sentinel application was developed as an accessible and handy piece of software that was built to detect file system changes. Clam Sentinel will automatically scan the files that have been added or modified using the ClamWin antivirus. Features: ...

HttpTrafficGen  v.1.8.8

HTTP traffic generator allows to generate a good amount of http traffic for testing web applications, web servers, intrusion detection system and their resistance to HTTP attacks. You can specify the requests count and interval between two requests.

Security Center Lite

Security Center is network security software for real-time intrusion detection IDS and prevention IPS that helps to protect networks from potential intruders, unauthorized connections and malicious activities. The unique network monitoring engine provide ...

1-abc.net Duplicate Finder  v.6.00

This very easy to use program helps you to detect duplicate files on your machine, on external hard drives, on CDs, DVDs, USB sticks and camera cards. Since each user defines duplicate files different concerning file name, file size, attributes, last ...

Pages : < 1 | 2
Newest Reviews