Software Listing: Dos And Ddos Attack Prevention

Ax3soft Sax2 is a professional intrusion detection and prevention system that performs real-time packet capturing, 24/7 network monitoring, advanced protocol analyzing and automatic expert detection. By giving you insights into all of your network's operations, Sax2 makes it easy to isolate and solve network problems, identify network bottleneck and bandwidth use, detect network vulnerabilities and discovered the network whether there is a breach of security strategy and the signs of being attacked in the network of hazard, and then intercept and stop before their invasion. Network administrators can directly monitor http requests, email messages, ftp transfers, as well as real-time activities and message details for the two popular instant messengers: MSN and QQ.

  • Publisher: Ax3soft
  • Date: 24-06-2011
  • Size: 7052 KB
  • Platform: Win2000, Windows Server, WinOther

Ax3soft Sax2 is a professional intrusion detection and prevention software (NIDS) used to detect intrusion and attacks, analyze and manage your network which excels at real-time packet capture, 24/7 network monitor, advanced protocol analysis and automatic expert detection.

With insight into all operations in your network, Sax2 makes it easy to isolate and solve your network security problems - detect network vulnerabilities, identify network security threats, catch actions against of security strategy and signs of been attacked. Finally, intercept and stop these connections.

Sax2 offers many kinds of intrusion analysis reports, such as events, type, source address and destination address of attacks, and many crossover reports and compositive reports.

  • Publisher: Ax3soft
  • Date: 25-02-2011
  • Size: 7051 KB
  • Platform: WinOther
  • Panoptis
  • License: Freeware
  • Price: 0.00
  • Rating

Panoptis plans to create a network security tool (N-IDS) to detect and block DoS and DDoS attacks. The programming language is C++, and the input is being provided by routers..

  • Platform: Linux, Unix

JaguiD is a Java GUI for DOS. It consists of several sub-projects including a Java Compiler, a Class Runner and a Jar Packager. JaguiD has limited Java support to provide a Graphical User Interface for DOS and compatibles..

  • Platform: Linux, Mac OS X, WinOther

ThreatSentry Windows Web server Host Intrusion Prevention software defends IIS against new and progressive attack techniques, protects network weak points, overcomes lapses in patch management, and reinforces regulatory compliance. An ISAPI filter hosted in MMC, ThreatSentry compares server requests to a knowledgebase and an evolving system baseline to detect untrusted activity and prevent attacks on Microsoft IIS. Supports Win 2000/2003, IIS 5/6.

Unsurpassed Protection from Known/New, Internal/External Threats -
Advanced system/behavior profiling and comparative analysis engine enables ThreatSentry to extend the intrusion detection and prevention capabilities of conventional pattern matching, rules, and policy-based systems.

  • Platform: Probably All

ThreatSentry Windows Web server Host Intrusion Prevention software defends IIS against new and progressive attack techniques, protects network weak points, overcomes lapses in patch management, and reinforces regulatory compliance. An ISAPI filter hosted in MMC, ThreatSentry compares server requests to a knowledgebase and an evolving system baseline to detect untrusted activity and prevent attacks on Microsoft IIS. Supports Win 2000/2003, IIS 5/6. Unsurpassed Protection from Known/New, Internal/External Threats - Advanced system/behavior profiling and comparative analysis engine enables ThreatSentry to extend the intrusion detection and prevention capabilities of conventional pattern matching, rules, and policy-based systems.

  • Publisher: Privacyware
  • Date: 15-02-2004
  • Size: 9940 KB
  • Platform: Win2000, Windows Server

Free Comodo Memory Firewall is a buffer overflow detection and prevention tool which provides the ultimate defense against one of the most serious and common attack types on the Internet - the buffer overflow attack. Free Comodo Memory Firewall detects most buffer overflow attack attempts such as attacks on STACK memory, HEAP memory, ret2libc attacks and of corrupted/bad SEH Chains, Comodo Memory Firewall protects against data theft, computer crashes and system damage by preventing most types of buffer overflow attacks. The product is aimed for system administrators as well as desktop users to protect their systems and detects suspicious code executions in the stack or the heap portions of the memory.

  • Platform: Windows Server, Windows Vista, WinOther
  • debxxf
  • License: Freeware
  • Price: 0.00
  • Rating

debxxf is the name of a DPMI debugger for DOS and Win16 applications. It has more features than the simple DEBUG, but OTOH it won't run with simple DPMI hosts like cwsdpmi and it needs more memory..

  • Platform: WinOther

Mizu VoIP Server is an all in one enterprise grade softswitch solution with support to SIP, H.323 and WebRTC. All common Class5 features are included such as sophisticated routing, access rules, CDR record generation, billing and accounting and offers full compatibility with your SIP infrastructure. Highlights: -Rich featured: SIP, H323, WebRTCP, all sip related protocols, SIP-H323 conversion, WebRTC to SIP conversion, class5 features, PBX featires, IVR, call conference, call forward, call transfer, billing, dtmf and codec transcoding, etc. -Mizu server has very simple licensing. with the unlimited license plan, you don\'t have to worry anymore on the number of ports that you plan to use -High call density: one Mizu server can replace several hardware based expensive solution, making real benefits for your company -Robustness:...

  • Platform: WinXP, WinVista, WinVista x64, Win7 x32, Win7 x64, Windows2003, WinServer, Windows Vista, Windows 10, Windows 8, Windows Server 2012

Secure and managed .net component that executes DOS and console commands. Each command executes asynchronously and raises events containing current output, completion status, and DOS ERRORLEVEL. Users can also set timeouts, abort commands, and simulate user input. Includes binaries, merge module, sample solution, documentation and technical support..

  • Platform: MS-DOS, Win2000, WinOther

My Endpoint Protector provides device control and data loss prevention to everyone who want to centrally manage and control the use of USB, FireWire and other ports and portable storage device use. It works for PC and Mac OS X. Free for personal use. It is a SaaS Solution, meaning the management is happening in the cloud over an internet browser. My Endpoint Protector Key Benefits: 1. Centrally manage your endpoint / device use from anywhere 2. No server setup (hardware, licenses or maintenance) 3. Enterprise class endpoint security for every size company 4. Manage one or hundreds of PC endpoints from one online place 5.

  • Publisher: CoSoSys
  • Date: 17-06-2010
  • Size: 4371 KB
  • Platform: Mac OS X, Win7 x32, Win7 x64, WinOther, WinVista, WinVista x64

WANGUARD is a professional commercial software for IP traffic monitoring and accounting, traffic anomalies detection and DDoS mitigation. It contains a network traffic analyzer and collector that supports NetFlow, sFlow, IPFIX, IPv6 and Port Mirroring. It provides customizable Dashboards with real-time traffic graphs and tops, complex Reports with aggregated data for hosts, departments, interfaces, applications, etc. It generates real-time, historical or scheduled reports. It protects networks by cleaning malicious traffic or by black-holing destinations..

  • Platform: Linux, Linux Console, Unix

This is a little reflexion game developped in Freeware Turbo Pascal 7.01 Language. It runs under Ms-Dos, and has been tested successfully under Windows 95, Windows 98, Windows 2000 & Windows XP (Pro/Familial)..

  • Platform: WinOther

A GPLd hangman clone that runs in both dos and Linux, made to fulfill a project requirement in our Computer Programming class. It currently allows for hanging of different characters, and eventually 2 player mode in the future..

  • Platform: Linux, Unix

PC Security Tweaker is a security tweaking utility you can use to tweak Windows-based computers. It is compatible with all Windows versions and lets you control which users are allowed to access your PC and the level of access each user may have. You can choose to tweak access to lots of Control Panel applet functions, including Display, Network, Passwords, Printers, System, Add/Remove Programs, etc. You can enforce users to use separate system profile folders and provide them with their own custom shell folders such as Desktop, Start Menu, Favorites, My Documents. Additionally, by tweaking, you can: disable selected Start Menu items, lock and protect disk drives in My Computer, disable the DOS and command prompt, interruption boot keys, real DOS mode, Registry editing, taskbar, task manager, and network access, hide desktop icons, and...

  • Publisher: PC-Safety
  • Date: 07-03-2013
  • Size: 1936 KB
  • Platform: Win2000, Win7 x32, Win7 x64, Windows Server, Windows Vista, WinOther

Reenix is a combination of the best of both worlds: DOS and *x. Based on the GNU toolkit and FreeDOS, Reenix is a stepping-stone between the two OSes and a subset of *x which will run on an 8088.
Reenix: DOS-16 based *x like environment License - BSD License; GNU General Public License (GPL); GNU Library or Lesser General Public License (LGPL); MIT License; Public Domain.

  • Platform: WinOther

bash-like shell for microsoft-based operating systems (currently onlyMS-DOS and Dos boxes under win98). Perfect complement to djgpptools (ls, etc), very desirable for those who are forcedto do development under windows, but miss bash and tools.
prsh - proper shell for dos License - GNU General Public License (GPL).

  • Publisher: Prsh
  • Date:
  • Platform: WinOther

Tao ExDOS Pro is a comprehensive and commercially proven solution for DOS and Win16bit based applications under Windows 7, Vista, XP, 2000 and Windows Terminal Servers. The technology used in Tao ExDOS 2009 products is proprietary and is not available in any other products on the market.

The software engines used for the product have been developed for over 5 years and comprehensively tested for full support and flawless operation in any environment.

The line of products covers any number of issues encountered daily by DOS users under modern operating systems.

FEATURES:

* Running DOS applications in a simulated native environment
* Allowing DOS applications to run in Full Screen mode, also under Windows 7 and Vista with the Aero user interface enabled
* Printing to any...

  • Platform: Win7 x64, Windows 7, WinOther, WinVista, WinVista x64
  • Hyenae
  • License: Freeware
  • Price: 0.00
  • Rating

Hyenae is a tool which allows users to test their netwotrk by generating packet. It allows you to reproduce low level ethernet attack scenarios (such as MITM,DoS and DDoS) to reveal the potential security vulnerabilities of yournetwork. Besides smart wildcard-based address randomization and a highly customizable packet generation control, Hyenae comes with a clusterable remote daemon for setting up distributed attack networks..

  • Platform: WinOther, WinServer

Simple , Addictive and Challenging.

"Attack the Zombies" puts you in the drivers seat on the Freeway from Hell.
In your hands is the greatest weapon - YOUR VEHICLE !

Use your VEHICLE to eliminate Zombies that come in your path. The quicker
you "RAM" into them the higher your score.

Swing your finger up,down right and left to get the Zombies and avoid the obstacles.

Pick up "Life Enhancers" on the way and avoid the nasty branches in your path.

3 Chapters with different terrains to test your skills.

By Day and By Night Mode.

  • Platform: Windows Phone, WinMobile

Page: 1 | 2 | 3 | 4 | 5 | Freeware

New Reviews


MarkdownPad

It is not really difficult to create basic webpages, having said that, if you don’t know about HTML, it can be a tedious task. HTML stands for Hypertext Markup Language which basically is used to create webpages. It is not a difficult language ...


CCleaner

If you’ve used any computer for fairly long time, you might have noticed it gets slower and slower over the time. This process is slow and generally goes unnoticed until your computer gets too sluggish to go unnoticed. This is due to unused ...


Skies of War

Skies of war is a top down plane shooter free ware game which really does reinvent the concept, and add a great deal to it. In skies of war you are a plane tasked with destroying a vast number of bases, enemy units and enemy planes. As you play ...


Norton Internet Security Beta

Due to growing number of cyber-attacks, need of secure computers and networks has increased dramatically. Therefore, new protection technologies are being introduced every day and are incorporated into different products. This has led to evolution ...


Aqua Pearls Game

Aqua Pearls game (or simply aqua pearls) is a free ware downloadable game that has many elements of the classic game zuma. In aqua pearls (and zuma) A variety of coloured balls will slowly work their way around the screen on a predetermined path, as ...


Battle of Britain

Battle of Britain is a top down strategy and shooter game that takes place during the historic battle of Britain, as the name would suggest. The game takes place from a top down perspective, and has a fairly interesting method of control. Instead of ...


Windows Movie Maker

Windows movie maker, expressed as windows live movie maker in the latest updates, is a piece of video and picture editing software for windows (as the name of the software no doubt suggests) designed to be simple, easy to use while still keeping as ...


Trillian

If you are an avid internet user, you'll be having accounts and friends all over Google, Facebook, MySpace, MSN and other such networks. With multiple accounts and probably hundreds of friends distributed over these networks, it becomes ...


Ad-Aware Free Antivirus+

You might have experienced that with some programs, other smaller programs are attached and they get installed silently. Also, many times, these programs, also known as adware or spyware, are downloaded silently or by mistake through internet. ...



New Downloads

Abettor Clipboard

The Abettor Clipboard Manager
floats on top of your current
work. Whenever you cut or
copy, the clip appears in one
of ...

InboxLock

InboxLock removes and blocks
emails based on your
decisions. It eliminates the
need for opt-out lists or spam
filters.

PC Win Booster

PC Win Booster is an
application that lets the user
keep up Windows clean, stable
and fast. Register once and
use all ...

CSV2QFX

Your professional Accounting
Software uses QFX files. That
means you can\'t import those
incredibly common CSV and
Excel ...

Leawo DVD Creator for Mac

Leawo DVD Creator for Mac is
an all-around video to DVD
creating tool that can burn
all media files to DVD, 3D DVD
and ...

Photo Show Pro

A Slide Show allowing you to
view pictures wrapped around
geometric shapes that rotate
and move various ways.
Multiple ...

TwinkiePaste

TwinkiePaste is the utility to
quickly typing commonly used
text, dates, greetings,
standard dates, greetings,
standard ...

TVideoGrabber Delphi Video
SDK

TVideoGrabber is a video
capture, media player and
editor SDK. Features include
AVI/WMV/MKV/WebM/MP4
recording, frame ...

Acronis Backup for VMware

The fastest, easiest backup
solution for your VMware
setup! Enjoy complete server
backups, full vCenter
integration and ...



Related Searches

Ddos Attack
Ddos Attack Tool
Ddos Attack Tools
Ip Ddos Attack
Ddos Attack Linux
Ssl Dos Email Attack
Usb Virus Attack Prevention Tool
Windows Xp Firewall Ddos Attack
Software Dos Attack
Dos Attack Tools
Dos Attack Linux
Web Attack Dos