Archive

Archive for the ‘IT-Tools’ Category

GeSWall

May 25th, 2007
Comments Off on GeSWall

With GeSWall, you can safely surf the web, open e-mail attachments, chat, exchange files etc, regardless of the security threats posed by the internet. GeSWall protects you from intrusions and malicious software by isolating vulnerable applications. Isolation applies an access restriction policy that effectively prevents all kinds of attacks, known and unknown.
Read more…

IT-Tools

BeEF – Browser Exploitation Framework

May 25th, 2007
Comments Off on BeEF – Browser Exploitation Framework

BeEF is the browser exploitation framework. Its purposes in life is to provide an easily integratable framework to demonstrate the impact of browser and cross-site scripting issues in real-time. The modular structure has focused on making module development a trivial process with the intelligence existing within BeEF.

IT-Tools

Argos – Emulator for Zero-Day Attacks

May 25th, 2007
Comments Off on Argos – Emulator for Zero-Day Attacks

Argos is a full and secure system emulator designed for use in Honeypots. It is based on QEMU, an open source processor emulator that uses dynamic translation to achieve a fairly good emulation speed.
Read more…

IT-Tools

Keygloo

May 25th, 2007
Comments Off on Keygloo

This is a public key based authentication model that works by verifying whether the user is in posession of his private key. The user should have Keygloo installed in his system for authenticating himself into any Keygloo enabled web application.
Read more…

IT-Tools

IPSecuritas

May 25th, 2007
Comments Off on IPSecuritas

IPSecuritas lets you easily setup IPSec VPN connections to another host or network over the Internet, while securing your data by encryption and authentication. This way, you can easily and cheaply access your office network from any point of this world, always knowing your communication is safe and protected from others.
Read more…

IT-Tools

UserLock: Manage Networks Access Control

May 25th, 2007
Comments Off on UserLock: Manage Networks Access Control

UserLock is a Windows network security utility that secures access to networks by restricting simultaneous sessions, by limiting user access to network resources and by providing network administrators with remote control and session analysis.
Read more…

IT-Tools

strongSwan

May 25th, 2007
Comments Off on strongSwan

strongSwan is an OpenSource IPsec implementation for the Linux operating system. It is based on the discontinued FreeS/WAN project and the X.509 patch which we developped over the last three years. In order to have a stable IPsec platform to base our future extensions of the X.509 capability on, we decided to lauch the strongSwan project.
Read more…

IT-Tools

Centron Firewall Iptables GUI Client

May 25th, 2007
Comments Off on Centron Firewall Iptables GUI Client

The Centron IPTables Firewall Gui is an object oriented, database driven, windows interface to linux IPtables firewall rules. The idea is a free Linux based firewall to people who can´t afford expensive commercial grade firewalls and need to have simplified firewall administration.
Read more…

IT-Tools

Microsoft Anti-Cross Site Scripting Library

May 25th, 2007
Comments Off on Microsoft Anti-Cross Site Scripting Library

This download contains the redistributable files for the Microsoft Application Security Anti-Cross Site Scripting Library. The Anti-Cross Site Scripting Library can be used to provide comprehensive protection to web-based applications against Cross-Site Scripting (XSS) attacks.

IT-Tools

Cyberhawk – zero-day protection software

May 25th, 2007
Comments Off on Cyberhawk – zero-day protection software

Novatix’s Cyberhawk is zero-day security software designed for the average consumer. Cyberhawk protects in real-time against viruses, worms, trojans, buffer overflows, rootkits, and even some spyware. It is designed to be used alongside your current antivirus to protect you between antivirus updates. Because it is behavior-based and not signature-based, Cyberhawk protects against both known and unknown, or zero-day, threats.
Read more…

IT-Tools