Software Listing: Buffer Overflow

Free Comodo Memory Firewall is a buffer overflow detection and prevention tool which provides the ultimate defense against one of the most serious and common attack types on the Internet - the buffer overflow attack. Free Comodo Memory Firewall detects most buffer overflow attack attempts such as attacks on STACK memory, HEAP memory, ret2libc attacks and of corrupted/bad SEH Chains, Comodo Memory Firewall protects against data theft, computer crashes and system damage by preventing most types of buffer overflow attacks. The product is aimed for system administrators as well as desktop users to protect their systems and detects suspicious code executions in the stack or the heap portions of the memory.

  • Platform: Windows Server, Windows Vista, WinOther

Heap/stack buffer overflow monitor is the next-generation in innovative anti-virus technology for PCs and servers. It monitors heap/stack buffer overflow of malicious software such as network worms in real time, extends coverage for unknown security risks, and reduces the cost of managing an outbreak response.Buffer overflow vulnerabilities are the result of poor input validation, they enable an attacker to run his input as code in the victim. Buffer overflows are a favorite exploit for hackers. A vast majority of applications suffer unchecked buffer problems.Features: 1. Automatic monitor all applications, provide the real-time protection from the viruses or hackers that carries on the attack using the buffer overflow problems.

  • Publisher: Shuxun Li
  • Date: 05-06-2009
  • Size: 563 KB
  • Platform: Win2000, WinOther

The signature-based DragonWAF activates defense mechanism when IIS server is under attack, it records all attack patterns using intellectual filtration techniques, webmasters are able to add more filtration strings by themselves, customize warning messages. The multiple graphic reports facilitate log management, making optimal security control an easy task. DragonWAF is capable of blocking any SQL Injection target at database (Oracle, MySQL), DragonSoft offers the online updater and continuously to update database.DragonWAF effectively prevents against 18 common web application attack methods: 1.

  • Platform: Windows Server, WinVista

ProcessorFeatures is a no-frills applet that uses the Windows IsProcessorFeaturePresent API to determine if the processor and Windows supports various features such as No-Execute pages, Physical Address Extensions (PAE), and a real-time cycle counter. Its primary purpose is to identify system's running the PAE version of the kernel and that support no-execute buffer overflow protection..

  • Platform: WinOther

Antivirus software and firewalls play valuable roles in protecting your system. However they cannot protect your computer from hackers and worms that use buffer overflow security holes in Windows to infiltrate into the system. Once your computer is under hackers' control, they will turn your day into a nightmare. In a few seconds they can stealthily copy your documents, passwords, credit card numbers or run a malicious application. DefencePlus offers what traditional antiviruses and firewalls miss - a real-time anti-hacking protection. It is specifically designed to eliminate stack- and heap-based buffer overflow vulnerabilities, traditionally exploited by hackers.

  • Platform: Win2000, Windows Server, WinOther

The signature-based DragonWAF activates defense mechanism when IIS server is under attack, it records all attack patterns using intellectual filtration techniques, webmasters are able to add more filtration strings by themselves, customize warning messages. The multiple graphic reports facilitate log management, making optimal security control an easy task. DragonWAF is capable of blocking any SQL Injection target at database (Oracle, MySQL), DragonSoft offers the online updater and continuously to update database.

DragonWAF effectively prevents against 18 common web application attack methods:
1.

  • Platform: Windows Server

An alternative to the string library for C and C++ which is more functional and does not have buffer overflow problems..

  • Platform: WinOther

An interactive visualization tool that teaches the concept of Buffer Overflow Exploitation. This program is intended to instruct users on the underlying principles and NOT how to perform an exploit.
SecFN (Security For Neophytes) License - Educational Community License, Version 2.0.

  • Platform: WinOther

An all-in-one blocker of spyware, buffer overflows, keyloggers, viruses, adware, trojans, and worms. OSsurance allows only the Windows programs you authorize to run and stops self- modifying programs from doing damage. Simplify your protection. Protect Windows now against the next malicious attack, against software vulnerabilities before they are discovered. No need to wait for virus signature updates or for security patches in order to be secure. OSsurance provides better Operating System protection against viruses, worms, spyware, Trojans and Buffer Over Flow attacks than what is currently available in firewalls, anti-virus software, anti-worm software, anti-spying software, parental control passwords and patch management software.

  • Platform: Win2000, Windows Server, WinOther

ServerDefender Vulnerability Protection (VP) Web application firewall is designed to provide immediate PCI compliant protection for Web sites and applications running on the Microsoft IIS Web server by blocking Web attacks including SQL injection, buffer overflows, cross-site scripting (XSS) and request forgery (CSRF), zero-day, brute force, dictionary, denial of service and others. SQL Injection - SDVP scrutinizes incoming data with a set of strict web application security controls thereby preventing SQL injection attacks attempting to use application code to access or corrupt database content.

  • Platform: Windows Server

StormShield Personal Edition is a free security software application developed from SkyRecon's industry-leading professional solution StormShield Endpoint Security. StormShield Personal Edition provides protection against major risks in Internet browsing and attacks against the operating system and applications.

The sophistication of threats spread by the Internet continues to grow at an alarming rate. More numerous and increasingly difficult to detect, these attacksd-deOCLfrom viruses, spyware, Trojan horses, malware, etc. d-deOCL are poorly addressed by conventional personal protection technologies.

  • Platform: WinOther

ThreatSentry Windows Web server Host Intrusion Prevention software defends IIS against new and progressive attack techniques, protects network weak points, overcomes lapses in patch management, and reinforces regulatory compliance. An ISAPI filter hosted in MMC, ThreatSentry compares server requests to a knowledgebase and an evolving system baseline to detect untrusted activity and prevent attacks on Microsoft IIS. Supports Win 2000/2003, IIS 5/6. Unsurpassed Protection from Known/New, Internal/External Threats - Advanced system/behavior profiling and comparative analysis engine enables ThreatSentry to extend the intrusion detection and prevention capabilities of conventional pattern matching, rules, and policy-based systems.

  • Publisher: Privacyware
  • Date: 15-02-2004
  • Size: 9940 KB
  • Platform: Win2000, Windows Server

Internet Download Manager is a tool for increasing download speeds by up to 5 times, and for resuming, scheduling, and organizing downloads. The program will resume unfinished downloads due to lost connections, network problems, or unexpected power outages. It can connect to the Internet at a set time, download the files you want, and disconnect or shut down your computer when it's done. It supports FTP, HTTP, and SHTTP protocols, MP3 audio files, and MPEG video-content processing. Version 4.07 build 3 improves the general security of Internet Download Manager, adds batch downloads and several enhancements to the logic of download engine, fixes buffer overflow bug when taking over downloads with long URLs, adds authorization dialog in case authorization information don't match, and improves processing of sites that demand different...

  • Publisher: Tonec Inc
  • Date: 05-06-2006
  • Size: 1290 KB
  • Platform: Win2000, Windows Server, WinOther

N-Stalker Web Application Security Scanner 2006 is a state-of-the-art security assessment tool developed by N-Stalker. By incorporating the well-known N-Stealth HTTP Security Scanner and its 35,000 Web Attack Signature database, along with a patent-pending Component-oriented Web Application Security Assessment technology, N-Stalker is capable of sweeping your Web Application for a large number of vulnerabilities common to this environment, including Cross-site Scripting and SQL injection, Buffer Overflow and Parameter Tampering attacks and much more..

  • Publisher: N-Stalker
  • Date: 08-09-2006
  • Size: 12426 KB
  • Platform: Win2000, Windows Server, WinOther

You can keep your company or private data confidential while transmitting via the Internet. Total Text Security encrypts your data with RSA keys (as used by PGP) or passwords, so nobody unauthorized can read it. Encrypted data can be saved to the file and be held on the disk, as well as sent in an email or an instant message via the Internet. This application is usable with any program. YouOCOll be impressed by how easy security can be.. SoftSphere Technologies, the official site of the DefenseWall HIPS - Host Intrusion Prevention System - Sandbox, Virtualization, Anti-Spyware, Anti-Rootkit, Anti-Malware, Anti-Keylogger, Anti-Virus.

  • Platform: Win2000, WinOther

It's a small utility which stays in the system tray, and when selected, offers you a list of all 60/79 Yahoo! Messenger smileys. Also stored with each image is the code. When you select a smiley, it will automatically insert the code into Yahoo! Messenger Chat, or a Yahoo! Messenger PM, if you don't use Yahoo! Messenger, or it doesn't automatically insert, their is a copy to clipboard option instead. If you simply want to see the smiley codes, click here, but many people would rather have them all in one menu, like they should be on the chat screen, but aren't.. HelpBytes: Yahoo! Chat, Messenger and Computer help.

  • Platform: Win2000, WinOther

DefenseWall is the easiest way to protect yourself from malicious software (spyware, adware, keyloggers, rootkits, etc.) when you surf the Internet! Using next generation proactive protection technologies, sandboxing and virtualization, DefenseWall helps you achieve a maximum level of protection against malicious software, while not demanding any special knowledge or ongoing online signature updates. No signatures, no popup windows, no false positives. It is just reliable and transparent protection, easy to use and strong.DefenseWall divides all applications into Trusted and Untrusted groups. Untrusted applications are launched with limited rights of modification of critical system parameters, and only in the virtual zone that is specially allocated for them, thus separating them from trusted applications.

  • Platform: Win2000, WinOther
  • Lobo
  • License: Freeware
  • Price: -
  • Rating

A pure Java web browser that fully supports HTML4, Javascript and CSS2. Lobo is an open source web browser completely written in Java. It is undergoing active development with the aim to fully support HTML 4, Javascript and CSS2. Lobo has a browser API and a plugin infrastructure.The general goal of the Lobo browser effort is to produce a browser that is fast, complete, easy to extend, feature-rich and secure.Here are some key features of "Lobo":Security- In principle, a Java program is less suceptible to certain types of vulnerabilities such as a buffer overflow attack. Java's security model can also allow web content to have access to a complex set of APIs, except in a controlled sandbox.

  • Platform: WinOther

See if you are protected against Blaster & Co viruses What is DCOM?Windows employs a component-based system to help programmers manage Windows' complexity. This system is called COM for "Component Object Model." Much of Windows itself, and many Windows programs, are assembled from individual COM components. Microsoft thought it would be "cool" if these COM components could find and use each other from different machines across a network, so Distributed COM (DCOM) was created to allow this. DCOM uses an existing networking protocol known as Remote Procedure Call (RPC), usually over Internet port 135, to host COM's distributed operation across a network.

  • Publisher: grc.com
  • Date: 26-9-2009
  • Size: 29 KB
  • Platform: WinOther

N-Stalker Web App Security Scanner Free Edition - enhance the overall security of your web server N-Stalker Web Application Security Scanner 2006 Free Edition is meant to replace previous available N-Stalker technology, i.e., the N-Stealth HTTP Security Scanner. It provides a free set of Web Security Assessment checks to enhance the overall security of your web server infrastructure, using the most complete web attack signature database available in the market "N-Stealth Web Attack Signature Database".Developed upon the patent-pending technology of Component-oriented Web Application Security Scanning, N-Stalker Free Edition allows for quick security assessment of Web Applications under the perspective of Infrastructure and Deployment phases.

  • Platform: WinOther

Page: 1 | 2 | 3 | 4 | 5 | Freeware

New Reviews


SpeedUpMyPC

SpeedUpMyPC is a program which apparently has the capabilities to boost your system performance by resolving computer issues it finds after scanning though your system SpeedUpMyPC is most definitely not the only piece of software that claims to be ...


World Domination 2

World domination 2 is a free flash turn based strategy game which has so many complex and realistic additions to the formula in the form of how production, technology and diplomacy between countries work, that it borders on being a realistic war ...


Funny Photo Maker

It happens a lot of times that you capture a photograph, it is good enough but you still want to play with it and improve it. There are lots of programs available for photo editing and some might say that you should use Adobe’s Photoshop. Yes, ...


MemZilla

Even though it may not look it, MemZilla is in fact a very simple application, that purely and simply aims to increase your system performance by freeing up more memory that can be used for opening more programs. MemZilla also provides some basic ...


Crash Boom Bang

Crash boom bang is a fairly interesting and unique puzzle game, which blends the elements of the pretty typical “removal” sub genre of puzzlers, with an interesting extra bit of variation added in the way the game works. This comes in ...


Brainteaser Cubes

Brain teaser cubes is a freeware first person action puzzle game, which is fully 3d, and has a fairly unique concept, most comparable to the console game portal, minus the portal elements (leaving just the cube based puzzles). The game is fairly ...


Auslogics Duplicate File Finder

If you have a lot of data and perform regular backups, or are particularly bad at keeping your system clean, tidy and organized, you may find that your computer starts to get a little clogged up with duplicate files. In my case, this is most obvious ...


Audacity

Audacity is one of the few free audio recording programs out there, which is great for people like me who need to record audio on a regular basis. Audacity is more than just  the simple “microphone to MP3” software that many will ...


Mozilla Thunderbird

Mozilla is well known name in the internet industry. In fact, good amount of people are connecting to internet with Mozilla Firefox and this number is growing with time but I’ll be sharing my views on one of the lesser known product of ...



New Downloads

Advanced Task Scheduler
Network

Client/Server software for
task scheduling, which allows
you to create scheduled tasks
on the server and manage them
from ...

Titan FTP Server

Titan is the SFTP Server
recommended by Cisco® &
used by hospitals, banks &
government agencies.

C# HTML to PDF

C# & VB .Net HTML to PDF
conversion library for
Microsoft .net web, desktop &
console applications. IronPDF
C# & VB ...

GetOrgChart

A JavaScript library for
building interactive flow
charts, specifically tailored
for displaying a company\'s
...

Inventoria Professional

With Inventoria, you can
manage and monitor your
inventory to help streamline
your operations and boost
profits. Use ...

World Population Monitor

World Population monitor
displays population count of
the world. The counter updates
itself automatically. Data
source: ...

Voxal Plus Edition

Voxal Plus Edition is a state
of the art voice changer
software to edit and add
effects to voice recordings.
You can also ...

Asoftech Photo Recovery

Asoftech Photo Recovery is an
easy to use data recovery
software available to restore
your photos, music and videos
from ...

dotConnect for MySQL

dotConnect for MySQL is an
enhanced data provider built
on ADO.NET architecture and a
development framework with a
number ...



Related Searches

Aqua Data Studio Buffer Overflow
Cd Writer Buffer Overflow
Capacity Buffer
Problems Buffer
Buffer Over Avg
Data Pic Buffer
Calculat Buffer
Overrun Buffer
Overstuf Buffer
Underrun Buffer
Free Video Buffer Download
Buffer Rop Drum