Software Downloads for "Bitdefender Intrusion Detection"

RegistryProt is a 100% free, standalone, compact, low-level realtime registry monitor and protector, that adds another dimension to Windows security and intrusion detection. By monitoring important locations and keys in the Windows system registry, RegistryProt will alert whenever a key is added or changed, and then give the option of accepting the key change, reverting back to the original key setting, or deleting the key. RegistryProt's most useful attribute is that it will detect the vast majority of trojans at the exact moment that they infect/install themselves into your system, and as such provides a new dimension in trojan and intrusion detection.

LANsurveyor is a powerful network management application that automates the discovery, topology mapping, documentation and reporting of critical network systems and components on your network in real time. LANsurveyor automatically discovers your network, including desktops, servers, printers, switches and routers. LANsurveyor uses industry-standard identification and discovery methods (ping/ICMP, SNMP, SIP-based VoIP, NetBIOS and more) to scan IP address ranges and find nodes. Once network nodes are discovered, LANsurveyor compiles the information into a cohesive, easy-to-view network map with node icons and colored lines representing network connectivity speed.

The CommandCenter-NOC was developed by Raritan to monitor your complete network system. Asset management, security monitoring, bandwidth analysis and reporting for almost any environment are combined in one application. The CommandCenter-NOC will discover and inventory new hardware and software on your system while providing easy to understand reports that cover service availability, outages, inventory, security, performance, delta inventory and open data framework reports. The simple point and click web interface allows easy system monitoring.

BlackICE PC Protection delivers bulletproof intrusion detection and personal firewall protection to your PC. It scans your DSL, cable, or dial-up Internet connection looking for hacker activity, much like antivirus programs scan your hard disk looking for viruses. BlackICE will not slow down your PC or your Internet experience. BlackICE PC Protection protects you in ways the other personal firewalls or antivirus software don't: it detects the attack, identifies and blocks the malicious activity before it can reach your computer, and identifies the attacker and type of attack by name; it fully inspects the contents of each packet, looking for hidden hostile code that personal firewalls cannot detect; it protects you from attack, even from someone you trust, through its dynamic IP address and port blocking.

  • Platform: Windows
  • Publisher: Network ICE
  • Date: 27-08-2009
  • Size: 5427 KB

Xintegrity makes it virtually impossible for anybody or anything to modify your files without being detected. When Xintegrity detects a modified file it will show exactly how and when the file was modified and display the contents of the modified file in comparison with an optionally backed up copy of the file. All your files [including operating system files] can be protected. Xintegrity can automatically create protected backup files [optionally encrypted with 256 bit AES] allowing you the option of restoring the file when modification is detected.

Agnitum Outpost is the first personal firewall developed with Open Architecture. It is also the first personal firewall that supports plug-ins. Sample plug-ins are included to show how this revolutionary technology can easily be employed for such tasks as Intrusion Detection, Advertisement Blocking, Content Filtering, E-mail Guard, and Privacy Control. It is equipped with every feature a personal firewall should have. It is the most functional firewall in the world. It supports all the latest security techniques and features such as: Full Stealth Mode, Anti-Leak, and MD5 Authentication.

  • Platform: Windows
  • Publisher: Agnitum, Ltd.
  • Date: 29-10-2009
  • Size: 2560 KB

AirSnare is a free, useful and reliable intrusion detection system to help you monitor your wireless network AirSnare is a free, useful and reliable intrusion detection system to help you monitor your wireless network.It notfies you as soon as a machine connects to your wireless network, that is not included in your list of friendly MAC addresses.You can configure the program to send an email notification to the administrator, log the connection, and also send a message to the connected machine, informing them that their actions are being monitored.

  • Platform: Windows
  • Publisher: Digital Matrix
  • Date: 03-06-2009
  • Size: 11161 KB

Security Center is a security application that monitors network traffic and protects you from potential intruders Security Center is a security application that monitors network traffic and protects you from potential intruders.Here are some key features of "Security Center Lite":Provides online network discoveryAutomatic threat discovery and Automatic vulnerability discoveryEnables online nodes display for analyzing Online network connections and transmission rateEnables manual or automatic protection against potential intrudersEnables proactive blocking of network nodes based on their MAC addressIP address or computer nameEnables proactive blocking of networks nodes based on their threat levelSupport wireless intrusion detection and preventionCollects network status and protection alerts and enables alerts forwardingEmail...

  • Platform: WinOther
  • Publisher: lan-secure.com
  • Date: 18-10-2009
  • Size: 1914 KB

Privatefirewall is a powerful Personal Firewall and Intrusion Detection Application that eliminates unauthorized access to your PC and protects your computer and data from hackers. Privatefirewall is high-performance desktop security that is affordable, feature-rich and simple to use. Select the links below for more information and to learn about special offers!Privatefirewall Main Features:Redesigned graphical interface - Increased control and ease of use. Email Anomaly Detection - Protects against malicious Email activity.

  • Platform: Windows
  • Publisher: privacyware.com
  • Date: 06-06-2009
  • Size: 7464 KB

Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic. Kismet identifies networks by passively collecting packets and detecting standard named networks, detecting (and given time, decloaking) hidden networks, and infering the presence of nonbeaconing networks via data traffic..

An open-source configurable virtual testbed (based on the Eucalyptus cloud platform) for Intrusion Detection System Evaluation..

devialog is a behavior/anomaly-based syslog intrusion detection system which detects unknown attacks via anomalies in syslog. It can generate signatures for ease of management, act upon anomalies in a predefined fashion or perform as a standard log parser.

The Distributed Intrusion Detection System..

The Firewall Tester is a tool designed for testing firewalls' filtering policies. It includes an Intrusion Detection System testing feature, along with a packet generator tool and a sniffer. Unlike common firewall testing tools or packet generators, fte.

Free Agents DIDS is a distributed intrusion detection system that you place on each host on your network. Agents intercommunicate with aes encryption, automatically alert you, and secure your network for free!.

IceIDS is heuristic Network Intrusion Detection System (NIDS) based on calculating Student's distributions of network traffic..

inundator is a tool used to anonymously inundate intrusion detection logs with false positives to obfuscate a real attack, leaving the IDS analyst feeling completely inundated..

Development of Linux kernel extensions which enable intrusion detection and prevention functionalities based on NSA's SELinux (http://www.nsa.gov/selinux/)..

The Network Security Response Framework (NSRF) allows for testing different computer security response engines and methodologies. It supports simulated and real: Intrusion Detection Systems (sensors), Attacks, and Responses..

This is a highly configurable and flexible testing tool capable of generating different streams of network packets based on set of parameters user provides, for performance & robustness testing on a NIDS - Network Intrusion detection System..

New Reviews


Disk Genius

Disk Genius was formerly known as Partition Guru which is an all-in-one solution for disk partition management, data recovery and disk repairing. It can recover lost files from partition, backup and restore partition table, clone partition or clone ...


Safe In Cloud

It is quite difficult to find any computer users nowadays who do not need to use the web, for any purpose. Whether it is for education or entertainment, the web is your best resource. You also need to use various online services for banking, ...


PictBear

Nowadays, a majority of PC users resort to digital image editing once in a while. It may be required for retouching image captured in smart phones or for creating an album in Facebook. For some people, tinkering with digital images is a pastime too. ...


Panda Cloud Cleaner

PC security has become a tricky and complicated subject both for home users and network supervisors, with complexity and risk factors multiplying over the years. Using a single antivirus app may not be enough anymore. That explains why many users ...


SnapCrab

Nearly every PC users need to take screenshots from time to time, whether it is for personal or professional needs. While using the basic Windows screenshot capture method is available, it is not adequate for everyone. When you want to capture ...


BitKiller

Dealing with various types of data efficiently holds the key to success in any computing task. Apart from generating new data and modifying existing files, it becomes necessary to delete existing files at times. While most users resort to using ...


SeaMonkey, Portable Edition

Using the Internet has become a necessity for a majority of people, including those who do not use a PC regularly. To browse web, stream video or download online content, people often resort to using various third party apps. For example, using ...


TuckAway Intelligent Email Organizer Pro

Using an email software allow you to do a number of things including managing your address lists, emails and even ending memos, documents and even virtual letters. You can also use it to manage your tasks easily. The email software comes in ...


WebAcappella

Web design sector has witnessed several trends and technological innovations affect website development in big ways. With time, designing websites has become easier. Nowadays, you can find web design software that nearly eliminates the need to ...


Zoolz

No serious PC user needs introduction about the need to backup data, both at home and workplace. There was a time when majority of people used external HDD or storage media to backup important data. However, local data backup has its limitations and ...


New Downloads

Copy Protect

Copy Protect offers copy
protection for your media
files like photos, videos,
audios, documents and more.
Copy Protect ...

Container Loading
Calculator

Container Loading Calculator
is smart, easy to use load
planning application. Insert
list of items or import them
from Ms ...

Fax Server Pro

Fax Server Pro is a client and
server system designed to
integrates fax communication
with your IT infrastructure.
...

Jolix CD Ripper

Jolix CD Ripper is a top CD
ripping/audio converting
software created for all types
of users looking to transfer
their ...

Movie DVD Convert

Movie DVD Convert is a
powerful, flexible and fast
tool to convert your DVD,
including Blu-Ray/HD/SD DVD to
popular video ...

Audio Recorder for Free

Audio Recorder for Free is an
audio recording application
that has the ability to
capture any sound like audios
played by ...

Recovery Toolbox for RAR

Repairs affected RAR archives,
restores affected checksums,
opens damaged files that were
corrupted during their
download ...

Audio Record Edit Toolbox
Pro

Audio Record Edit Toolbox Pro,
equipped with numerous
professional audio tools like
audio recorder, audio
converter, CD ...

BitTorrent MP3

BitTorrent Mp3 is one of the
best ways to download all the
music you want with minimum
effort. The program offers
speed, ...

HelpSmith

HelpSmith allows you to create
CHM HTML Help files, Web Help
systems, and Printed Documents
from a single source.