Software Listing: Dos And Ddos Attack Prevention

Ax3soft Sax2 is a professional intrusion detection and prevention system that performs real-time packet capturing, 24/7 network monitoring, advanced protocol analyzing and automatic expert detection. By giving you insights into all of your network's operations, Sax2 makes it easy to isolate and solve network problems, identify network bottleneck and bandwidth use, detect network vulnerabilities and discovered the network whether there is a breach of security strategy and the signs of being attacked in the network of hazard, and then intercept and stop before their invasion. Network administrators can directly monitor http requests, email messages, ftp transfers, as well as real-time activities and message details for the two popular instant messengers: MSN and QQ.

  • Publisher: Ax3soft
  • Date: 24-06-2011
  • Size: 7052 KB
  • Platform: Win2000, Windows Server, WinOther

Ax3soft Sax2 is a professional intrusion detection and prevention software (NIDS) used to detect intrusion and attacks, analyze and manage your network which excels at real-time packet capture, 24/7 network monitor, advanced protocol analysis and automatic expert detection.

With insight into all operations in your network, Sax2 makes it easy to isolate and solve your network security problems - detect network vulnerabilities, identify network security threats, catch actions against of security strategy and signs of been attacked. Finally, intercept and stop these connections.

Sax2 offers many kinds of intrusion analysis reports, such as events, type, source address and destination address of attacks, and many crossover reports and compositive reports.

  • Publisher: Ax3soft
  • Date: 25-02-2011
  • Size: 7051 KB
  • Platform: WinOther
  • Panoptis
  • License: Freeware
  • Price: 0.00
  • Rating

Panoptis plans to create a network security tool (N-IDS) to detect and block DoS and DDoS attacks. The programming language is C++, and the input is being provided by routers..

  • Platform: Linux, Unix

JaguiD is a Java GUI for DOS. It consists of several sub-projects including a Java Compiler, a Class Runner and a Jar Packager. JaguiD has limited Java support to provide a Graphical User Interface for DOS and compatibles..

  • Platform: Linux, Mac OS X, WinOther

ThreatSentry Windows Web server Host Intrusion Prevention software defends IIS against new and progressive attack techniques, protects network weak points, overcomes lapses in patch management, and reinforces regulatory compliance. An ISAPI filter hosted in MMC, ThreatSentry compares server requests to a knowledgebase and an evolving system baseline to detect untrusted activity and prevent attacks on Microsoft IIS. Supports Win 2000/2003, IIS 5/6.

Unsurpassed Protection from Known/New, Internal/External Threats -
Advanced system/behavior profiling and comparative analysis engine enables ThreatSentry to extend the intrusion detection and prevention capabilities of conventional pattern matching, rules, and policy-based systems.

  • Platform: Probably All

ThreatSentry Windows Web server Host Intrusion Prevention software defends IIS against new and progressive attack techniques, protects network weak points, overcomes lapses in patch management, and reinforces regulatory compliance. An ISAPI filter hosted in MMC, ThreatSentry compares server requests to a knowledgebase and an evolving system baseline to detect untrusted activity and prevent attacks on Microsoft IIS. Supports Win 2000/2003, IIS 5/6. Unsurpassed Protection from Known/New, Internal/External Threats - Advanced system/behavior profiling and comparative analysis engine enables ThreatSentry to extend the intrusion detection and prevention capabilities of conventional pattern matching, rules, and policy-based systems.

  • Publisher: Privacyware
  • Date: 15-02-2004
  • Size: 9940 KB
  • Platform: Win2000, Windows Server

Free Comodo Memory Firewall is a buffer overflow detection and prevention tool which provides the ultimate defense against one of the most serious and common attack types on the Internet - the buffer overflow attack. Free Comodo Memory Firewall detects most buffer overflow attack attempts such as attacks on STACK memory, HEAP memory, ret2libc attacks and of corrupted/bad SEH Chains, Comodo Memory Firewall protects against data theft, computer crashes and system damage by preventing most types of buffer overflow attacks. The product is aimed for system administrators as well as desktop users to protect their systems and detects suspicious code executions in the stack or the heap portions of the memory.

  • Platform: Windows Server, Windows Vista, WinOther
  • debxxf
  • License: Freeware
  • Price: 0.00
  • Rating

debxxf is the name of a DPMI debugger for DOS and Win16 applications. It has more features than the simple DEBUG, but OTOH it won't run with simple DPMI hosts like cwsdpmi and it needs more memory..

  • Platform: WinOther

Mizu VoIP Server is an all in one enterprise grade softswitch solution with support to SIP, H.323 and WebRTC. All common Class5 features are included such as sophisticated routing, access rules, CDR record generation, billing and accounting and offers full compatibility with your SIP infrastructure. Highlights: -Rich featured: SIP, H323, WebRTCP, all sip related protocols, SIP-H323 conversion, WebRTC to SIP conversion, class5 features, PBX featires, IVR, call conference, call forward, call transfer, billing, dtmf and codec transcoding, etc. -Mizu server has very simple licensing. with the unlimited license plan, you don\'t have to worry anymore on the number of ports that you plan to use -High call density: one Mizu server can replace several hardware based expensive solution, making real benefits for your company -Robustness:...

  • Platform: WinXP, WinVista, WinVista x64, Win7 x32, Win7 x64, Windows2003, WinServer, Windows Vista, Windows 10, Windows 8, Windows Server 2012

Secure and managed .net component that executes DOS and console commands. Each command executes asynchronously and raises events containing current output, completion status, and DOS ERRORLEVEL. Users can also set timeouts, abort commands, and simulate user input. Includes binaries, merge module, sample solution, documentation and technical support..

  • Platform: MS-DOS, Win2000, WinOther

My Endpoint Protector provides device control and data loss prevention to everyone who want to centrally manage and control the use of USB, FireWire and other ports and portable storage device use. It works for PC and Mac OS X. Free for personal use. It is a SaaS Solution, meaning the management is happening in the cloud over an internet browser. My Endpoint Protector Key Benefits: 1. Centrally manage your endpoint / device use from anywhere 2. No server setup (hardware, licenses or maintenance) 3. Enterprise class endpoint security for every size company 4. Manage one or hundreds of PC endpoints from one online place 5.

  • Publisher: CoSoSys
  • Date: 17-06-2010
  • Size: 4371 KB
  • Platform: Mac OS X, Win7 x32, Win7 x64, WinOther, WinVista, WinVista x64

WANGUARD is a professional commercial software for IP traffic monitoring and accounting, traffic anomalies detection and DDoS mitigation. It contains a network traffic analyzer and collector that supports NetFlow, sFlow, IPFIX, IPv6 and Port Mirroring. It provides customizable Dashboards with real-time traffic graphs and tops, complex Reports with aggregated data for hosts, departments, interfaces, applications, etc. It generates real-time, historical or scheduled reports. It protects networks by cleaning malicious traffic or by black-holing destinations..

  • Platform: Linux, Linux Console, Unix

This is a little reflexion game developped in Freeware Turbo Pascal 7.01 Language. It runs under Ms-Dos, and has been tested successfully under Windows 95, Windows 98, Windows 2000 & Windows XP (Pro/Familial)..

  • Platform: WinOther

A GPLd hangman clone that runs in both dos and Linux, made to fulfill a project requirement in our Computer Programming class. It currently allows for hanging of different characters, and eventually 2 player mode in the future..

  • Platform: Linux, Unix

PC Security Tweaker is a security tweaking utility you can use to tweak Windows-based computers. It is compatible with all Windows versions and lets you control which users are allowed to access your PC and the level of access each user may have. You can choose to tweak access to lots of Control Panel applet functions, including Display, Network, Passwords, Printers, System, Add/Remove Programs, etc. You can enforce users to use separate system profile folders and provide them with their own custom shell folders such as Desktop, Start Menu, Favorites, My Documents. Additionally, by tweaking, you can: disable selected Start Menu items, lock and protect disk drives in My Computer, disable the DOS and command prompt, interruption boot keys, real DOS mode, Registry editing, taskbar, task manager, and network access, hide desktop icons, and...

  • Publisher: PC-Safety
  • Date: 07-03-2013
  • Size: 1936 KB
  • Platform: Win2000, Win7 x32, Win7 x64, Windows Server, Windows Vista, WinOther

Reenix is a combination of the best of both worlds: DOS and *x. Based on the GNU toolkit and FreeDOS, Reenix is a stepping-stone between the two OSes and a subset of *x which will run on an 8088.
Reenix: DOS-16 based *x like environment License - BSD License; GNU General Public License (GPL); GNU Library or Lesser General Public License (LGPL); MIT License; Public Domain.

  • Platform: WinOther

bash-like shell for microsoft-based operating systems (currently onlyMS-DOS and Dos boxes under win98). Perfect complement to djgpptools (ls, etc), very desirable for those who are forcedto do development under windows, but miss bash and tools.
prsh - proper shell for dos License - GNU General Public License (GPL).

  • Publisher: Prsh
  • Date:
  • Platform: WinOther

Tao ExDOS Pro is a comprehensive and commercially proven solution for DOS and Win16bit based applications under Windows 7, Vista, XP, 2000 and Windows Terminal Servers. The technology used in Tao ExDOS 2009 products is proprietary and is not available in any other products on the market.

The software engines used for the product have been developed for over 5 years and comprehensively tested for full support and flawless operation in any environment.

The line of products covers any number of issues encountered daily by DOS users under modern operating systems.

FEATURES:

* Running DOS applications in a simulated native environment
* Allowing DOS applications to run in Full Screen mode, also under Windows 7 and Vista with the Aero user interface enabled
* Printing to any...

  • Platform: Win7 x64, Windows 7, WinOther, WinVista, WinVista x64
  • Hyenae
  • License: Freeware
  • Price: 0.00
  • Rating

Hyenae is a tool which allows users to test their netwotrk by generating packet. It allows you to reproduce low level ethernet attack scenarios (such as MITM,DoS and DDoS) to reveal the potential security vulnerabilities of yournetwork. Besides smart wildcard-based address randomization and a highly customizable packet generation control, Hyenae comes with a clusterable remote daemon for setting up distributed attack networks..

  • Platform: WinOther, WinServer

Simple , Addictive and Challenging.

"Attack the Zombies" puts you in the drivers seat on the Freeway from Hell.
In your hands is the greatest weapon - YOUR VEHICLE !

Use your VEHICLE to eliminate Zombies that come in your path. The quicker
you "RAM" into them the higher your score.

Swing your finger up,down right and left to get the Zombies and avoid the obstacles.

Pick up "Life Enhancers" on the way and avoid the nasty branches in your path.

3 Chapters with different terrains to test your skills.

By Day and By Night Mode.

  • Platform: Windows Phone, WinMobile

Page: 1 | 2 | 3 | 4 | 5 | Freeware

New Reviews


USB Guardian

Gone are the days when Floppies, magnetic tapes and rewritable disks were used to transfer data. Nowadays, USB Flash Drives are used to transfer files. USB Flash Drives are faster, cheaper, easier and more convenient way to transfer data. Along with ...


Windows Movie Maker

Windows movie maker, expressed as windows live movie maker in the latest updates, is a piece of video and picture editing software for windows (as the name of the software no doubt suggests) designed to be simple, easy to use while still keeping as ...


CloneCD

Despite huge growth in technology and tremendous increase in use of flash drives, use of CDs and DVDs hasn’t disappeared yet. Conventional 700MB CDs are still in use, largely due to the fact that they are extremely cheap. In addition of being ...


LogMeIn Hamachi

Today, world is connected wirelessly with and without VPN. In coming time, VPN is going to be an absolute necessity for every organization. VPN stands for Virtual Private Network which is required to connect to the network of an organization without ...


File Finder

File Finder is such a simple and easy program to use to track down and locate files and folders on your system. I think this has to be a fantastic selling point, but maybe also its downfall. It instantly took me back to the retro MS-DOS based ...


The Impossible Quiz FGC Guide

The impossible quiz is a legendary flash game of extreme difficulty, having achieved legendary status for both its extreme difficulty, and the amount of humour the game manages to include while executing this extreme level of difficulty. If you have ...


FixMe

FixMe is a small program that claims to help you fix common issues with your computer. Whether it actually does this or not, its actually difficult to judge. I downloaded the program with no issues and was pleasantly surprised to find that no ...


Hot Lines

Hot lines is a freeware logic based puzzle and strategy game, which is actually entirely its own game, but bares resemblance to logic game such as chess and even games such as advance wars for the portable nintendo systems. In hot lines you must ...


Time Fighter

Time fighter is a free ware game in the general two dimensional shooter genre. Many of the traits the game has are very generic and taken from and used by every other game in its genre, mainly the two dimensional field, the way the character (which ...



New Downloads

PDFZilla

PDFZilla is a desktop
application that quickly and
accurately convert PDF files
into editable MS Word
Documents, Excel ...

Home Plan Pro

Many CAD programs are designed
for architects and engineers.
Thesecan be expensive, as well
as hard to learn, and ...

Nero Platinum

Empower your digital life with
Nero Platinum 2018 for
high-performance multimedia.
Create, edit, burn, convert,
organize, ...

WorkflowFirst

Free Workflow Software and
Database. Create forms and
sub-forms, add workflow, click
publish - it\'s that simple. A
...

DigiSigner

DigiSigner is a simple PDF
viewer tool to digitally sign
PDF documents and verify
signatures. With DigiSigner
you can ...

Personal Timeclock

Personal Timeclock: Tracks and
reports your computer usage by
project and category. It can
help you with client billing,
...

CSV2QIF

Easy to use secure solution to
review/convert your
transactions and import into
your accounting software.
Convert CSV to ...

TaskRun - ToDo List
Calendar

ToDo Calendar with Pomodoro
Timer and Fitness and Calorie
Tracker. Weekly Calendar
Planner will help you to work
smarter, ...

Acronis True Image for Mac

Acronis True Image - the only
personal backup software that
actively defends against
ransomware. Protect the
personal ...



Related Searches

Ddos Attack
Ddos Attack Tool
Ddos Attack Tools
Ip Ddos Attack
Ddos Attack Linux
Ssl Dos Email Attack
Usb Virus Attack Prevention Tool
Windows Xp Firewall Ddos Attack
Software Dos Attack
Dos Attack Tools
Dos Attack Linux
Web Attack Dos