Software Listing: Iis Security

IIS Security Planning Tool uses a simple HTML interface to determine what services the server will provide, and recommends the deployment and installation options that will allow it to provide them securely.

IIS Security Planning Tool will prove very useful for admins when it comes to verifying the appropriate ISS security level for a specific server.

.

  • Platform: WinOther

Admin Report Kit for IIS 4.x / 5.x / 6.x (ARKIIS) is a powerful reporting tool for Microsoft IIS Administrators. ARKIIS presents IIS configuration information from the IIS Metabase in the form of Trees, Tables and Views. All categories of information reported by ARKIIS are available across multiple web servers and websites. ARKIIS is particularly useful in monitoring and tracking web servers that have a large number of websites, virtual directories and associated configuration settings.

ARKIIS supports current versions of Microsoft Internet Information Server (4.x / 5.x / 6.x) and localized versions of IIS.

  • Platform: Win2000, Windows Server, WinOther

Admin Report Kit for IIS 4.x / 5.x / 6.x (ARKIIS) is a powerful reporting tool for Microsoft IIS Administrators. ARKIIS presents IIS configuration information from the IIS Metabase in the form of Trees, Tables and Views. All categories of information reported by ARKIIS are available across multiple web servers and websites. ARKIIS is particularly useful in monitoring and tracking web servers that have a large number of websites, virtual directories and associated configuration settings.

ARKIIS supports current versions of Microsoft Internet Information Server (4.x / 5.x / 6.x) and localized versions of IIS.

  • Platform: Win7 x32, Win7 x64, Windows 8, Windows Server, WinOther

IIS Lockdown Wizard works by turning off unnecessary features, thus reducing attack surface available to attackers. To provide multiple layers of protection against attackers, URLscan, with customized templates for each supported server role, is integrated into the IIS Lockdown Wizard.

To keep the server completely secure, however, all hotfixes are required before and after applying IIS Lockdown Wizard to stay protected against known security vulnerabilities.

Get IIS Lockdown Tool and try it for yourself to see what it can actually do for you!

.

  • Platform: Win2000, Windows 7, WinOther, WinVista

ServerDefender Vulnerability Protection (VP) Web application firewall is designed to provide immediate PCI compliant protection for Web sites and applications running on the Microsoft IIS Web server by blocking Web attacks including SQL injection, buffer overflows, cross-site scripting (XSS) and request forgery (CSRF), zero-day, brute force, dictionary, denial of service and others. SQL Injection - SDVP scrutinizes incoming data with a set of strict web application security controls thereby preventing SQL injection attacks attempting to use application code to access or corrupt database content.

  • Platform: Windows Server

ARKIIS is a powerful reporting tool for Microsoft IIS Administrators. ARKIIS presents Microsoft Internet Information Services 7.x (IIS 7.5 / IIS 7.0 ) configuration information from the IIS 7.x configuration store in the form of Trees, Tables and Views. All categories of information reported by ARKIIS are available across multiple web servers and websites. ARKIIS is particularly useful in monitoring and tracking web servers that have a large number of websites, virtual directories and associated configuration settings..

  • Platform: Win7 x32, Win7 x64, Windows 8, Windows Server

GeoBlock filters all traffic from the client to your web-server based on locations that you select. You can even block locations all the way down to the state and city level! It is a fact that most hack attempts come from certain areas and countries. Stop them before they start and protect your site with GeoBlock! How does it work? In terms of its implementation model and technical approach, GeoBlock is unique and has no competitors. Utilizing the Tometa WhereIs web service for updates GeoBlock keeps a constant and updated database of every IP on the internet and the location for that IP. So for example if you block China from accessing your server the entire country will not be able to access it ever! GeoBlock improves the effectiveness and productivity of security pros and their servers, reduces the costs associated with system...

  • Platform: WinOther

If you own a web site with imporant information, this software is the only product available today (to the best of our knowledge) that can secure your data from spidering programs. This software is made as plugin for IIS and can be used with any scripting language supported by Microsoft IIS server. SpiderArmor makes your pages visible to users but not available for spidering programs that will make your data safe from scrapping by others!SpiderArmor is a breakthrough in site content protection. The company Soft Service Ltd managed to unit the advantages of the existing data protection techniques in one software SpiderArmor: * Protection against data copying by the client through the clipboard * Protection against content by viewing a HTML code both by means of a browser, and after data saving on a hard disk.

  • Platform: Win2000, Windows Server, WinOther

Professional Web Application Firewall for IIS. Manage, Protect and Active-Defend your IIS Server perfectly.
Features:
Anti-SQLFlood DDoS Attack.
Prevent SQL injection, cross Site scripting, directory traversal, evil encode and other webhacker intrusions.
Enable or Disable proxy server access.
Hotlinking prevention of pictures, downloading files and media files.
Anti-StealLink develop kits, supporting any web system and any user database.
Restrictions of downloading thread per IP and downloading speed per Thread.
Spurious server. Filter of HTTP command Keywords and versions.

  • Platform: Win2000, Windows Server

Professional Web Application Firewall for IIS. Manage, Protect and Active-Defend your IIS Server perfectly.
Features:
Anti-SQLFlood DDoS Attack.
Prevent SQL injection, cross Site scripting, directory traversal, evil encode and other webhacker intrusions.
Enable or Disable proxy server access.
Hotlinking prevention of pictures, downloading files and media files.
Anti-StealLink develop kits, supporting any web system and any user database.
Restrictions of downloading thread per IP and downloading speed per Thread.
Spurious server. Filter of HTTP command Keywords and versions.

  • Platform: Win2000, Windows Server

Admin Report Kit for IIS 7 (ARKIIS) is a powerful reporting tool for Microsoft IIS Administrators. ARKIIS presents Microsoft Internet Information Services 7.x (IIS 7.5 / IIS 7.0 ) configuration information from the IIS 7.x configuration store in the form of Trees, Tables and Views. All categories of information reported by ARKIIS are available across multiple web servers and websites. ARKIIS is particularly useful in monitoring and tracking web servers that have a large number of websites, virtual directories and associated configuration settings.

ARKIIS latest version supports Microsoft Internet Information Services 7.

  • Platform: Windows Vista

ThreatSentry Windows Web server Host Intrusion Prevention software defends IIS against new and progressive attack techniques, protects network weak points, overcomes lapses in patch management, and reinforces regulatory compliance. An ISAPI filter hosted in MMC, ThreatSentry compares server requests to a knowledgebase and an evolving system baseline to detect untrusted activity and prevent attacks on Microsoft IIS. Supports Win 2000/2003, IIS 5/6. Unsurpassed Protection from Known/New, Internal/External Threats - Advanced system/behavior profiling and comparative analysis engine enables ThreatSentry to extend the intrusion detection and prevention capabilities of conventional pattern matching, rules, and policy-based systems.

  • Publisher: Privacyware
  • Date: 15-02-2004
  • Size: 9940 KB
  • Platform: Win2000, Windows Server

Unscrupulous site owners may link to your content directly and literally STEAL your BANDWIDTH. This theft is commonly called leeching, hotlinking, inline linking, or bandwidth theft, and such direct linking to your valuable images, videos, binary files or other important site content is typically done without your knowledge, let alone your permission! Now, with LinkDeny, you can fight back and control full access to your Web site or Web-based application content and to ensure that your bandwidth use is for your site users only -- keeping out all types of "bad" traffic. LinkDeny powerful ACCESS CONTROL features allow you to transparently stop bandwidth pirates and potential hackers in their tracks by limiting their access via Web request metadata including, IP address, GeoIP (country or geographic), referring URL, demographics,...

  • Platform: Win2000, Windows Server, WinOther

Microsoft IIS Lockdown Tool lets you instantly configure an IIS 4.0 or 5.0 Web server for secure operation Microsoft IIS Lockdown Tool will provide you the means to instantly configure an IIS 4.0 or 5.0 Web server for secure operation. IIS Lockdown Wizard works by turning off unnecessary features, thus reducing attack surface available to attackers. To provide multiple layers of protection against attackers, URLscan, with customized templates for each supported server role, is integrated into the IIS Lockdown Wizard. To keep the server completely secure, however, all hotfixes are required before and after applying IIS Lockdown Wizard to stay protected against known security vulnerabilities.

  • Platform: Win2000, WinOther

ADT Security Discounts. ADT has been ranked America's number one home security provider and when you see all of their potential benefits, it is not hard to see why! Providing you with excellent value for money, a security system to suit any home and 24 hour monitoring, what more could you possibly ask for from a home security provider? ADT alarms contain advanced security features and they now come with wireless sensors. These help to detect an intruder before they get into your home. Many home security systems only alert you once the intruder has stepped foot inside the property. By then it could be too late to do anything.

  • Platform: Win2000, Windows 7 Home Basic, Windows Server, Windows Vista, WinOther

The signature-based DragonWAF activates defense mechanism when IIS server is under attack, it records all attack patterns using intellectual filtration techniques, webmasters are able to add more filtration strings by themselves, customize warning messages. The multiple graphic reports facilitate log management, making optimal security control an easy task. DragonWAF is capable of blocking any SQL Injection target at database (Oracle, MySQL), DragonSoft offers the online updater and continuously to update database.

DragonWAF effectively prevents against 18 common web application attack methods:
1.

  • Platform: Windows Server

AspEncrypt is an Active Server component that brings security to your application through encryption. With AspEncrypt, you can encrypt data, send S/MIME-based secure mail, compute one-way hash values, generate and verify digital signatures, issue and manage X.509 digital certificates, and more. This component can be used in an IIS/ASP or VB environment..

  • Platform: Asp, Scripts

This article discusses the importance of security considerations when designing a server application. Both Microsoft Internet Information Services (IIS) and ASP.NET provide security models that will allow you to authenticate your users appropriately and obtain the correct security context within your application..

  • Platform: Asp, Scripts

This System Center Configuration Pack helps monitor configuration compliance for computers running the Web server (IIS) role available in Windows Server 2008 R2 SP1.

This Configuration Pack provides a baseline for the Desired Configuration Management (DCM) Configuration Pack derived from the Best Practices Analyzer (BPA) for computers running the Web server (IIS) role available in Windows Server R2 SP1.

This Microsoft System Center Configuration Pack provides an ideal way, under normal circumstances, to configure this server role according to expert software engineers.

Best practice violations, even critical ones, are not necessarily problematic.

  • Platform: Windows Server

Web Application Configuration Analyzer (WACA) analyzes server configuration for security best practices related to General Windows, IIS , ASP.NET and SQL Server settings.
.

  • Platform: Windows 7, WinOther, WinServer, WinVista

Page: 1 | 2 | 3 | 4 | 5 | Freeware

New Reviews


Screencatch

There are numerous occasions when you need to take screenshot of anything on your computer. A screenshot is used for serving many purposes like tutoring, in eBooks, as electronic proofs etc.Taking screenshots is a relatively tedious task without ...


Soft4Boost Disk Cleaner

Soft4Boost Disk Cleaner is a really easy program to use. There are thousands of different applications out there, free and paid, that try and remove junk from your system to help improve speed and overall system performance. Soft4Boost Disk Cleaner ...


Jewel Quest 3 Game

Jewel quest (3) is a free ware downloadable game from Free Ride games, a game development studio with a fair number of high quality games on this website. Jewel quest isn't an exception to this rule. Jewel quest is essentially a clone of the ...


Joomla

Nowadays, most people use Joomla, Wordpress or Drupal to make their websites. Creating websites by the use of CMSs is an easy yet effective way as one does not require to code heavily. We’ll be talking about Joomla, a powerful Content ...


SD QuickExec

Im always scouting the internet looking for quality applications that’ll help me save time carrying out some of the basic things I do every time I switch on my computer. For example, launch my internet browser, email client, iTunes and so on. ...


Battle of Britain

Battle of Britain is a top down strategy and shooter game that takes place during the historic battle of Britain, as the name would suggest. The game takes place from a top down perspective, and has a fairly interesting method of control. Instead of ...


Mozilla Thunderbird

Mozilla is well known name in the internet industry. In fact, good amount of people are connecting to internet with Mozilla Firefox and this number is growing with time but I’ll be sharing my views on one of the lesser known product of ...


Ad-Aware Free Antivirus+

You might have experienced that with some programs, other smaller programs are attached and they get installed silently. Also, many times, these programs, also known as adware or spyware, are downloaded silently or by mistake through internet. ...


Opera Mini

Opera mini is a free to download web browser designed for the android platform, and is one of the most popular mobile browsers in  the world, more successful than even the full on desktop version of opera. Opera mini's dominance in the ...



New Downloads

VyprVPN for Windows

The VyprVPN for Windows
application automatically
configures and simplifies
managing your VPN connections.
Switch freely ...

Nsauditor Network Security
Auditor

Nsauditor is an advanced
network security scanner for
auditing and monitoring
network computers for possible
...

Clipboard Auto Clear

Worried about spy ware reading
your clipboard? Want to free
up the huge resources that
some clips consume? Clipboard
...

PostgreSQL ODBC driver
(32/64 bit)

Devart ODBC Driver for
PostgreSQL provides
high-performance and
feature-rich connectivity
solution for ODBC-based ...

Easy Photo Resize

With the help of our program
you will easily resize your
image collection in three
steps

MixPad Music Mixer Free

MixPad is free music recording
and mixing software designed
for easy audio production. Mix
music, vocal and audio tracks,
...

WidsMob ConverterPDF

WidsMob ConvertPDF is an
excellent PDF converter to
convert PDF to Word, Excel,
Image, XML, HTML, TXT and more
other ...

PicConvert

Convert, resize and rename
thousands of image files in
batch mode. Select the images
that you want to convert,
choose an ...

Datattoo Recovery

Recover deleted, corrupted or
lost files by Michael
Haephrati, Secured Globe Inc.
Pay only for each MB you
recover.



Related Searches

Cyber Security Free
Security Cover
Security Covert
Security P Data
Access Security Free
Security Access
Security Mac Address
Security Webcam
Absolute Security
Advanced Security For Outlook
Aspfusion Security Box
Aspfusion Security