|
|
|
|
|
|
|
Whois |
Whois communicates with WHOIS servers located around the world to
obtain domain registration information.
This tool will lookup information on a
domain, IP address or hostname, including country, state or
province, city,
name of the network provider, administrator,
etc. |
Finger |
Finger tool allows to
get user information or “Abuse Address” of remote host
by using finger servic
( somewhere .com@abuse.net ) |
DnsLookup |
Resolves a hostname to an IP address or
vice versa. |
|
|
Recommended Products |
Network Security Software |
|
Nsauditor Network Security Auditor is a network security scanner that allows to audit and
monitor network computers for possible vulnerabilities, checks your network for all potential
methods that a hacker might use to attack it. Nsauditor is a complete networking utilities
package that includes a wide range of tools for network auditing, scanning, monitoring and
more. You can discover network services and check them for vulnerabilities, list all TCP and
UDP endpoints with their associated process, discover NetBios names, audit MS SQL
servers, scan for common Adware traces and more . The program also includes real-time
network packet filtering and analyzing, web proxy scanning, password auditing, IP address
lookup and more than 45 network tools for scanning, sniffing, enumerating and gaining
access to machines, DNS and WHOIS lookups, e-mail validation, HTTP traffic generator and
intrusion detection based on security events log. Reports can be generated in HTML and
XML format. Overall, this is a very complete package for a surprisingly low price.
Awards
winning software ! Download
Here |
|
|
|
SpotAuditor
- Internet Explorer, Outlook and MSN messenger password
recovery
SpotAuditor reveals
passwords saved in Internet Explorer, recovers ICQ,
Trillian, Miranda
IM, VNC, Far ftp client, SecureFX
ftp client, FileZilla, WebDrive Ftp, FTP Voyager, AutoFTP,
32bit FTP, FTP Navigator, Dial-up, RAS, VPN, Outlook,
MSN messenger, Windows Live
Messenger 8 and Windows
Messenger passwords, IE Auto Complete Fields and recovers
passwords stored behind the asterisks in password text-boxes.
It is a program for viewing
and cleaning the secret
data stored by Internet Explorer. SpotAuditor allows
deletion of
unwanted entries from the system protected
storage and explores Outlook Accounts, Visited
URLs,
Installed Programs and Start Run Programs on a local
machine or remote computers.
SpotAuditor allows to clear
Internet Explorer history, delete cookies and temporary
internet
files. You can recover and restore any lost
or forgotten password ever entered in Internet
Explorer.SpotAuditor
instantly cracks and decrypts passwords stored on your
computer!
Download Here |
|
|
|
ShareAlarmPro
- Monitoring Network Access To Shared Folders and Resources
ShareAlarmPro
is a network tool that allows network administ rators
and users easily perform
a shared
folders and resources monitoring.
Using ShareAlarmPro you can monitor
users
attempting to access
secured shares and confidential files, detect and
log network
access
to shared folders,monitor
security events and create
alerts for specific events occurring
on your computer,
monitor open files, disconnect users from open files
or deny
network
users access and send
console messages.
Download
Here |
|
|
NetShareWatcher - Monitors Network Shares and Identify
Shares which are
Violating Data Access Policy
It allows network administrators
to monitor
network shares and identify
shares which are
violating data
access policy in their organization.
NetShareWatcher is very handy. You
can
configure it once and forget about network sharing
problems. You need just select restricted
groups or
users and every time when NetShareWatcher
will find network share with acces
list containing
that restricted groups and will perform an configured
action. It allows you to
easily monitor
network shared folders and
permissions. NetShareWatcher alerts anytime an
user
sets a share ACL to "Everyone" or some other
global group that violates your data
access policy as
well as disable this shared folders automatically if
you have selected
appropriate feature in the settings.
NetShareWatcher has user friendly interface and is easy
to use. Being configured once, it will regularly notify
you on network sharing detection with
restricted permissions
assigned.
Download
Here |
|
|
|
BlueAuditor - detecting and monitoring Bluetooth devices in a wireless network
BlueAuditor
is a wireless
personal area network auditor
and easy-to-use program for
detecting
and monitoring Bluetooth devices in
a wireless network. It can discover and track
any Bluetooth
device within a distance between 1 and 100 meters and
display key
information about each device being detected
as well as the services device provided.
With the growing
popularity of the Bluetooth
technology,BlueAuditor
will enable network
administrators to effectively
audit their wireless networks against security vulnerabilities
associated with the use of Bluetooth devices. BlueAuditor
enables the user to save the
data of the detected Bluetooth
devices in an .xml file and supports the most Microsoft
Bluetooth drivers available on the market. All the mentioned
features are provided with
a user friendly graphical
interface.
Download Here
|
|
|
|
RemShutdown - allows Shutdown or Restart Network Computers Remotely
RemShutdown
allows shutdown
or restart network computers remotely. You
can specify a
delay during which a message you specify
can be displayed and applications running on the
remote
computer at the time of shutdown can be allowed to close.
In addition, RemShutdown
offers the user the option
to cancel the shutdown. The tool is designed with a
user-friendly
interface and is easy to use.
Download Here
|
|
|
|
Product
Key Explorer
Product Key Explorer displays product key for Windows,
MS Office, SQL Server and more
than 500 popular software
products installed on your local or remote network computers.
In order to install or reinstall Microsoft Office, Windows,
or other commercial software, you
must have access to
a product serial key (CD Key) for that product. Product
Key Explorer
retrieves serial keys from network computers
and allows to protect your company from
having pirated
software on your network. With this software you will
be able to track the
number of software licenses installed
in your business, find and recover a lost or forgotten
product keys, save and keep an up-to-date backup of
all your software license keys in a
central location.
Excellent tool for network administrators, or businesses
undergoing a
software license compliancy. You can save
product keys as Tab Delimited Txt File (.txt),
Excel
Workbook (.xls), CSV Comma Delimited (.csv), Access
Database (.mdb), Web Page
(.html) or XML Data (.xml)
file, Print or Copy to Clipboard.
Download Here |
|
|
|
NetworkSleuth - Network
File Search Utility
NetworkSleuth is a fast file search
tool, that allows search for files located on local
or
network computers and supports searches for documents,
image, MP3, music and video
files, allows to search
for files in Local Area Network(LAN) based on various
criteria.
Download
Here
|
|
|
|
|
|
|