KisMAC
KisMAC is a free stumbler application for MacOS X, that puts your card into the monitor mode. Unlike most other applications for OS X it has the ability to run completely invisible and send no probe requests.
KisMAC is a free stumbler application for MacOS X, that puts your card into the monitor mode. Unlike most other applications for OS X it has the ability to run completely invisible and send no probe requests.
The lifespan of notebook PCs, PDAs and smartphones is falling as the pace of technology marches ever onwards. But for every new mobile device purchased by organisations of all sizes there is usually a piece of legacy hardware that gets sold, passed on to a colleague, friend or relative, or simply thrown away in the… Read More »
Many IT executives today are tasked with finding a way to understand their organization’s true security posture, as they must prove that “due care” is being taken to secure their networks. The pressure to prove true security levels comes from business partners, company executives, industry regulations, and maintaining company reputation.
Network Password Manager (NPM) is a multiuser, client-server software that allows employees to manage passwords within their company. Network Password Manager supports all standard password management functions, has flexible administrative options, convenient user interface and many advanced functions.
USB Monitor is an invaluable tool for all developers and engineers, who design, create and connect to PC a whole range of equipment with universal serial bus on board. This tool captures all the USB Request Blocks (URBs) transferred from the device driver to the host controller and back.
FirePanel XP is an extension for the new firewall found in Windows XP SP2 and Windows Server2003 SP1. FirePanel XP it modifies your Windows Firewall, with features not normally available to users. You can set rules, monitor your firewall activity, watch logs, and keep realtime tabs on what exactly your connection is being exposed to.
In the classic war movie The Dirty Dozen, Lee Marvin’s maverick major must make a crack fighting unit from an unruly squad of prisoners, then launch an all-out assault behind enemy lines. It’s a near-impossible assignment.
As with many other business analysis issues, there are three sides to the story when looking at Web application security testing: yours, the findings of your vulnerability assessment, and the truth. Whether you’re using a commercial or open source scanner, you’re undoubtedly going to glean a lot of information and come across vulnerabilities.
Federal and state government regulations can be a big problem for today’s organizations. There are more than 100 such regulations in the U.S. alone, and that number continues to grow. These are in addition to industry-specific mandates. They are all designed to safeguard the confidentiality, integrity, and availability of electronic data from information security breaches.… Read More »