Software Listing: Apache Security

N-Stalker Web Application Security Scanner 2006 is a state-of-the-art security assessment tool developed by N-Stalker. By incorporating the well-known N-Stealth HTTP Security Scanner and its 35,000 Web Attack Signature database, along with a patent-pending Component-oriented Web Application Security Assessment technology, N-Stalker is capable of sweeping your Web Application for a large number of vulnerabilities common to this environment, including Cross-site Scripting and SQL injection, Buffer Overflow and Parameter Tampering attacks and much more..

  • Publisher: N-Stalker
  • Date: 08-09-2006
  • Size: 12426 KB
  • Platform: Win2000, Windows Server, WinOther

N-Stalker Web App Security Scanner Free Edition - enhance the overall security of your web server N-Stalker Web Application Security Scanner 2006 Free Edition is meant to replace previous available N-Stalker technology, i.e., the N-Stealth HTTP Security Scanner. It provides a free set of Web Security Assessment checks to enhance the overall security of your web server infrastructure, using the most complete web attack signature database available in the market "N-Stealth Web Attack Signature Database".Developed upon the patent-pending technology of Component-oriented Web Application Security Scanning, N-Stalker Free Edition allows for quick security assessment of Web Applications under the perspective of Infrastructure and Deployment phases.

  • Platform: WinOther

Apache Shiro was specially built to be a powerful and easy-to-use Java security framework.

Apache Shiro can perform authentication, authorization, cryptography, and session management.

With Shiro’s easy-to-understand API, you can quickly and easily secure any application – from the smallest mobile applications to the largest web and enterprise applications.


.

  • Platform: WinOther

Apache Santuario is a specially developed project that's been aimed at providing an implementation of the primary security standards for XML.

Now you can make use of this handy library to further improve your development process.



.

  • Platform: WinOther

This book will guide you through creating your own sites using the open source AMP model. You'll learn to install PHP, Apache, and MySQL. Then you'll create PHP Web pages, including database management and security. Finally, you'll discover how to integrate your work with e-commerce and other technologies. By building different types of Web sites, you will progress from setting up simple database tables to tapping the full potential of PHP, Apache, and MySQL..

  • Platform: PHP, Scripts

Ida, is a Apache log security analyzer written in PHP. It will scan Apache logs and report about security incidents like SQL injections, XSS attacks, path traveling and so on..

  • Platform: Linux, Mac OS X, WinOther

Security Department is a resident file system protector for Windows 95 and Windows 98. It provides several levels of protection for different folders and files. You can prevent various actions for folders and files : copying, moving, deleting, renaming and so on. In addition to the two standard protection levels "Read Only" and "Full protection", there is the Custom Protection level that allows you to fine tune the access..

  • Platform: WinOther

LASsie (Light Application Security) is a library of Microsoft Access objects that you can reference from, or add into your MS Access application to implement basic form level security. With LASsie, you can prevent a user from opening specific forms, or restrict a user's ability to update data on a form..

  • Platform: WinOther

As everyone knows that, no one live without the web any longer. The major source of information is online and it is even the biggest source of risk for your system, so why not utilizing the software for internet security as it can keep safe you as well as your system from harmful online risks. Whether it was accidental or intentional, everybody gets knock by troubles with their systems and by utilizing security program to keep safe yourself; you would be decreasing the dangers of that occurring. Conception a concrete safety for your network and computer can observed complicated. Utilizing the firewall system for your home or business network is almost certainly the very basic and very standard feature you want for your system.

  • Platform: WinOther

LASsie (Light Application Security) is a Microsoft Access Add-In that enhances your Access application with a simplified user security system. Intended as an alternative to Access’ built-in security, LASsie offers a less complicated way to secure forms, reports, controls and certain records from unauthorized user access. With LASsie, you can prevent a user from opening specific forms/reports, restrict their ability to update data on a form, disable certain controls, filter certain records, all based on a user’s assigned Security Level. LASsie includes a friendly user sign-on form that prompts for a login user name and password.

  • Platform: Win2000, WinOther

WebCam - Hidden Security / Surveillance Software / WebCam Software Turn your PC into a powerful hidden security / surveillance system! No need to purchase any expensive equipment! All you need is a web cam! Guardian II can record everything that goes on when your not around! Or... Guardian II can monitor the area for motion And... email you a picture when motion is detected! Guardian Is The Ultimate Hidden Security / Surveillance System! Download And Try Guardian II - Security Cam For FREE!.

  • Platform: Win2000, Windows Server, WinOther

Our Security software will work only on Windows 95/98/ME/2000 Operating System. Our Security System will help keep your computers safe from general public as well as your friends and collegues. You just need to remember the passwords which you can change any time. It will Protect your Computer from · Unauthorize use by anyone. · You can Start the security system whenever you leave your computer. · It will not allow others to view your data and update them in your absence. · It will stop viruses comming from other people when you are away from your PC. Anyone working on your system will have to provide the proof that he/she is allowed to use that computer.

  • Platform: Win2000, Windows CE, Windows Server, WinOther

Now a day email is the significant part of the communication. On the other hand, this even means that the email is regarded as most famous ways for the virus for infecting the computer. You require protecting from any such kind of threat of infection and fraud. Email attachments generally contain the viruses that you require to be very careful at any time you open every kind of attachment if you know sender. Moreover, there are few viruses which may infiltrate the address book and then even send email which are infected to each and every one on the list. It means that you will get the virus from the colleague or the friend.

  • Publisher: Apocgraphy
  • Date: 01-01-2005
  • Size: 1869 KB
  • Platform: Win2000, WinOther

The Internet security involves complete protection of the computer's Internet account as well as files from the kind of attack and the intrusion of the complete unauthorized user. Moreover, the unauthorized access of the computer can also occur once your computer gets connected to the network and start communicating with various other computers and accessing the malware-infected site through Internet. For avoiding this, it is also suggested to set up the password and also to install the software of Internet security. However, threats are main reason that why these are made for detecting and removes the viruses and other kinds of malicious attacks which may simply enter the computer.

  • Platform: Win2000, WinOther

The Small Business Security Manager is designed to assist the classified facilities security officer (FSO) with visitor control, employee security training, and document control duties. It meets the US Government's Facilities Security requirements is these three areas. A user friendly interface, numerous reports, batch employee training and data update capabilities, and visit requests and authorized access list generation significantly reduce administrative time. The SBSM is a Microsoft Access 2000 application with an application file and separate data file. A Visual Basic "helper" file is used to start the application.

  • Platform: Win2000, WinOther

Omniquad Total Security 2005 includes everything you need to protect your small office or home computer in one modular package featuring MyPrivacy, AntiSpy, Personal Firewall, Anonymous Surfing, Password Organizer, File Encryptor and Outlook Encryption. MyPrivacy helps you maintain your privacy by cleaning up all traces of your Internet and computer activities. It helps you erase data you may have entered like personal information in online forms, URLs in your browser address bar, files you searched for, etc - data that otherwise would be exposed to other users of your computer. AntiSpy finds and removes spying and advert-displaying programs from your computer.

  • Platform: Win2000, WinOther

Oracle Security Check will connect to your database and test against an internal list of standard usernames and passwords. If any are found, they are reported as potential security holes..

  • Platform: Win2000, WinOther

DefendGate Security Suite 2004 is designed to provide your computer with comprehensive and superior protection against deadly worms, viruses, hackers, and other forms of network threats and nuisances. DefendGate Security Suite comes complete with an intelligent Spam filter and will provide your system with all the coverage it needs to keep you working at optimal speed. DefendGate SmartFix: 1. Anonymous web surfing feature allows you to surf the web without exposing your personal information. 2. Permanently destroy old files using an integrated high security NSA standard file shredder. 3. Safeguard your system using an integrated high security lockdown mode.

  • Publisher: DefendGate
  • Date: 01-10-2004
  • Size: 2404 KB
  • Platform: Win2000, Windows Server, WinOther

pdfapps PDF Security and Privacy Audit 2.0 Do you leave private, confidential or sensitive information in PDFs? Do your published PDFs conform to your information security policy? Auditing your PDF documents before release is a crucial business step in information management. PDF Security and Privacy Audit helps perform this step by instantly showing and reporting on the metadata and security permissions in your PDF documents. Features and Benefits: Instantly batch report on private metadata information that may have been left in PDFs. See the hidden data you never knew existed in your documents: Author, Creator, Producer, Title, Subject, Keywords.

  • Publisher: PDFapps.com
  • Date: 08-05-2005
  • Size: 1639 KB
  • Platform: Win2000, Windows Server, WinOther

SecurityCheck Audit common security vulnerabilities get corrective recommendations and easy remedies for Windows systems. Check & correct unset or blank passwords, prevent unauthorized changes to important system-wide settings and programs. Secure wireless networks & prevent unauthorized access to important, private data. Reduce or eliminate shared folders, a key security vulnerability. Eliminate Guest Accounts an easy access point to all your data. Complete desktop security anlaysis..

  • Platform: Win2000, WinOther

Page: 1 | 2 | 3 | 4 | 5 | Freeware

New Reviews


Castle Wars

Castle wars is a unique blend of the strategy genre with a small amount of war and micro management elements added in to make it more unique. In castle wars the aim is to eliminate all the other players from the map, and become the only player left ...


World Domination 2

World domination 2 is a free flash turn based strategy game which has so many complex and realistic additions to the formula in the form of how production, technology and diplomacy between countries work, that it borders on being a realistic war ...


Arctic Quest Game

Arctic  quest game (referred to in game as simply arctic quest) is a free ware downloadable game by free ride games, a game development website with a variety of games also downloadable from this site. Arctic quest is a very interesting puzzle ...


Joomla

Nowadays, most people use Joomla, Wordpress or Drupal to make their websites. Creating websites by the use of CMSs is an easy yet effective way as one does not require to code heavily. We’ll be talking about Joomla, a powerful Content ...


Smart Defrag 2

From right back in the early days of Windows, there has always been a disk defragmenter included as standard, called (funnily enough) Disk Defragmenter. Its changed a lot as times have moved on and Microsoft upgraded Windows. There are many ...


Ocster 1-Click Backup

Nowadays, backing up is more of a necessity than ever before. Daily, people are experiencing hardware failures, computer crashes, and virus attacks that are damaging and destroying data, and in some cases just silly mistakes are causing people to ...


Windows WinBest

Windows WinBest is an application, created to speed up your computer and remove junk files from your system. Right from the second I opened Windows WinBest, I become very skeptical about whether I’d like this application. Almost instantly, I ...


Access Controller

Access Controller is an application that helps secure your computer desktop whilst your away from it. When you're away from your computer, you can enable Access Controller so that a password is required to unlock your desktop and continue ...


Clear All History

Regardless of what you do online and who you share your computer with, its always has been and always will be a good idea to clear your traces and virtual footprints left behind on your system. Not only is this good practice to help protect your ...



New Downloads

AnyChart JS Charts and
Dashboards

AnyChart is a flexible,
cross-platform/browser,
dependency-free JS chart
library for adding interactive
bar, area, pie, ...

WinM8

Winm8 is a combined multi
clipboard, launcher, Web
bookmark and information
management system. Winm8 is
not just a multi ...

Icecream Screen Recorder

Simple, powerful and smart
application for creating
screencasts and screenshots
with the help of advanced
options. The ...

Home Plan Pro

Many CAD programs are designed
for architects and engineers.
Thesecan be expensive, as well
as hard to learn, and ...

Free 2D Barcode Generator

The programe generates and
prints most popular matrix and
stacked 2D barcode symbologies
including Aztec Code, Data ...

Bank2QBO

Finally, the solution to
import your transactions.
Convert QFX/OFX/QBO/QIF to QBO
and import into Quickbooks,
...

Web Log Explorer Lite

Web Log Explorer Lite is
freeware a powerful log
analyzer generates interactive
reports on-the-fly. It allows
you to dig ...

Banners Module for Directy
CMF

The Banners Module allows
administrator to upload images
for banner and display them in
banner slider on the site or
...

Relay Timer R2X

Relay Timer R2X is
programmable timer software to
contro 2-channel relay
controller boards ofNational
Control Devices ...



Related Searches

Apache Login Security
Cyber Security Free
Cost Of Apache
Security Cover
Security Covert
Security P Data
Access Security Free
Security Access
Security Mac Address
Security Webcam
Absolute Security
Advanced Security For Outlook