SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
HOME             PURCHASE            PRODUCTS              CONTACT US             SUPPORT               RESELLERS


                                                       Nsauditor Network Security Auditor
                                Network security is not just a set of locked doors and passwords.
                                A truly secure environment is an ever changing entity which requires constant care and monitoring.
                                How Secure Is Your Network? Audit and Test Your Network Security with Nsauditor!

                                Nsauditor Network Security Auditor - Advanced All-In-One Network Tools Suite includes more than 45
                                network tools and utilities for network auditing, scanning, network connections monitoring and more.
                                Nsauditor is Network Security and Vulnerability Scanner that gives you the pow er to scan, detect and correct any potential
                                security risk on your network. Nsauditor allow s monitoring network computers for possible vulnerabilities, checking
                                enterprise netw ork for all potential methods that a hacker might use to attack it and create a report of potential
                                problems that w ere found. Nsauditor helps netw ork administrators to identify security holes and flaw s in their
                                netw orked systems. The program also includes firew all system, real-time network monitoring, packet filtering and
                                analyzing. Nsauditor significantly reduces the total cost of netw ork management in enterprise environments by enabling
                                IT personnel and systems administrators gather a w ide range of information from all the computers in the netw ork
                                w ithout installing server-side applications on these computers and create a report of potential problems that w ere
                                found.

                                A network monitor tool provides some insight into services running locally, w ith options to dig dow n into each connection
                                and analyze the remote system, terminate connections, block unw anted netw ork connections w ith incrusted firew all
                                system and view data on the associated process.

                                      Overall, this is a very complete package for a surprisingly low price         $69.00 ( VIEW COMPARISON CHART )
                                                                 Nsauditor 1 User License ( 69.00$ )                  Order Now!
                               Top Reasons why Nsauditor is right for you:
                               1. No Limitations W ith Nsauditor 1 user license you can scan all computers in your
                                                 company w ithout limits.
      Recent version: 2.4.1    2. Ease of Use    Nsauditor is the easiest to use toolkit on the market.
 Full version for only $69.00 3. Quality         We deliver highest quality and stable programs.
W indow s 7/2000/XP/2003/Vista 4. Support        We grant you unlimited 24 / 7 support. You'll get all future versions
                                                 for free. Your softw are license is yours to use FOREVER. No monthly,
      Free to Try 15 Days                        yearly charges, you pay just a one-time purchase price!
                               5. Scalability    We keep our softw are cost on comfortable level $69.00
                               6. Affordability  We offer attractive discount prices for Multi-User Licenses
                                                                                                 BUY NOW   | DOWNLOAD | NETWORK AUDITING DEMO | AWARDS

                            Nsauditor Network Security Auditor Screencast                                                   PURCHASE
                                                                                                                            BUY NOW

                                                                                                                            MULTI-USER LICENSE

                                                                                                                            PRODUCTS
                                                                                                                            NSAUDITOR

                                                                                                                            PRODUCT KEY EXPLORER
                                                                                                                            BACKUP KEY RECOVERY

                                                                                                                            SPOTAUDITOR PASSWORD RECOVER

                                                                                                                            BLUEAUDITOR

                                                                                                                            SHAREALARMPRO

                                                                                                                            REMSHUTDOW

                                                                                                                            NETSHAREWATCHER

                                                                                                                            NETWORKSLEUTH

                                                                                                                           FOLLOW US
                                                                                                                                                             9

                                                                                                                           EMAIL SUBSCRIPTION
                                                                                                                              Enter your Email to be Notified of
                                                                                                                                     Softw are Updates:


                                                                                                                                     converted by Web2PDFConvert.com
Related product:
 Network Software Inventory - Software License Tracking Solution!                                                                       Get Updates
                Nsasoft Network Software Inventory is softw are license tracking solution. The softw are scans
                netw ork and displays complete softw are information! Nsasoft Netw ork Softw are Inventory is a             POPULAR ARTICLES
                pow erful netw ork inventory softw are for home, office and enterprise netw orks. The softw are scans
                all computers on a netw ork and generates complete reports about computers softw are. It is                      Network Security & Vulnerability
                integrated IT Help Desk, Asset management & Softw are license management solution. Netw ork                      Network Security Software
                Softw are Inventory helps technicians to understand the problems w ith the softw are license                     Wireless Network Security
                compliance and the use of unauthorised softw are in the organization. Nsasoft Netw ork Softw are
                Inventory allow s to get a complete picture of Purchased Vs installed softw are for managing the
                                                                                                                                 Network Security Auditing
                softw are licenses. Associate the minor versions and allocate softw are licenses for all your                    Network Access Control
                "Managed Softw are" in the netw ork.                                                                             Company Security Policy
                                                                                                                                 Home Network Security
                                                    BUY NOW | DOWNLOAD | MORE INFORMATION |                    | 29.50$          Software Comparison
                                                                                                                                 Network Monitoring
                                                                                                                                 Computer Network
 Related product:                                                                                                                Network Inventory
 Hardware Software Inventory - Scans network and displays complete hardware & software information                               Network Auditing
                                                                                                                                 Network Security
                Nsasoft Hardware Software Inventory is a pow erful netw ork inventory softw are for home, office                 Network Scanner
                and enterprise netw orks. The softw are scans all computers on a netw ork and generates complete                 Internet Security
                reports about computers hardw are and softw are. This information is added to the centralized
                database and then users can generate reports about each or all of the PCs on a netw ork. The
                                                                                                                                 Network Attack
                program is agent free and requires no softw are installed on remote machines. Nsasoft Hardw are                  Encryption
                Softw are Inventory - Scans netw ork and displays complete hardw are and softw are information!                  Firewall
                The softw are can export reports to Tab Delimited Txt File (.txt), Excel Workbook (.xls), CSV Comma              Data Recovery
                Delimited (.csv), Web Page (.html) or XML Data (.xml) file, SQLLite3 Database. Highly recommended                Ethical Hacking
                for budget-conscious companies looking for a feature rich netw ork inventory tool.                               WebSite Security
                                                                                                                                 Antivirus Software
                                                    BUY NOW | DOWNLOAD | MORE INFORMATION |                    | 69.00$          Computer Security
                                                                                                                                 Information Security
                                                                                                                                 Cloud Computing
 Related product:                                                                                                                Intrusion Detection
 NBMonitor Network Bandwidth Monitor - Network Monitoring                                                                        Password Recovery
                                                                                                                                 Product Key Recovery
                Need to track your Internet bandwidth usage?                                                                     Software License Compliance
                NBMonitor Network Bandwidth Monitor can Really Help Y ou to do it!
                As a number of ISP’s are now disconnecting customers for using “too much” bandw idth, know ing              VOLUME LICENSING
                exactly how much you’ve dow nloaded or uploaded in a given month can be very helpful. NBMonitor
                tracks your Internet bandw idth (upload and dow nloads) usage, monitors all your Internet, it show s        Join our Volume Licensing
                all the active connections you have to the Internet at any given moment and also the volume of              Program and achieve substantial
                traffic flow ing through them. NBMonitor displays real-time details about your netw ork connections         savings on purchases of 5 or more
                and netw ork adapter's bandw idth usage. Unlike others, it show s process names initiated netw ork          Softw are licenses.
                connections and allow s you to set filters to capture only the traffic you are interested in.                        VOLUME LICENSING »

                                                    BUY NOW | DOWNLOAD | MORE INFORMATION |                    | 17.50$     TESTIMONIALS
                                                                                                                            "Very broad collection of netw ork
                                                                                                                            a udit tools. We think this is one of
 Related product:                                                                                                           the best integrated netw ork multi-
 BlueAuditor - BlueAuditor Monitors Mobile Devices in Wireless Network                                                      tools w e have looked at."
                BlueAuditor - Scan and Monitors mobile devices in a w ireless netw ork! BlueAuditor is a w ireless                      SC MAGAZINE
                personal area netw ork auditor and easy-to-use program for detecting and monitoring mobile
                devices in a w ireless netw ork. It can discover and track any mobile device w ithin a distance                     MORE TESTIMONIALS »
                betw een 1 and 100 meters and display key information about each device being detected as w ell
                as the services device provided. W ith the grow ing popularity of w ireless technology, BlueAuditor w ill
                enable netw ork administrators to effectively audit their w ireless netw orks against security
                                                                                                                            AWARDS
                vulnerabilities associated w ith the use of mobile devices. BlueAuditor enables the user to save the
                data of the detected mobile devices in an .xml file and supports the most Microsoft drivers available
                on the market. All the mentioned features are provided w ith a user friendly graphical interface

                                                    BUY NOW | DOWNLOAD | MORE INFORMATION |                    | 19.50$

 Nsauditor Key Features
AUDITOR                                                                                                                                MORE AWARDS »
Netw ork Auditor is a tool to discover the netw ork services and to check them for discovering w ell know n security
vulnerabilities. This tool creates an audit report in HTML and XML formats.                                                 SUPPORT
                                                                                                                                   Free 24 / 7 Support
NETWORK MONITOR
Netw ork Monitor show s detailed listings of all TCP and UDP endpoints, including the ow ning process name and                   Free Lifetime Upgrades
details, remote address and state of TCP connections, as w ell as the host dns name, country , netw ork class,                          VISIT OUR SITE
appropriate service name and service description.
                                                                                                                                        EMAIL US HERE
NETBIOS AUDITOR
NetBios Auditor is a tool to discover NetBios names. NetBios names are the names of the Services and Machines.
NetBIOS Scanner is a pow erful and fast tool for exploring netw orks , scanning a netw ork w ithin a given range of IP      CUSTOMERS
addresses and for listing computers w hich offer NetBIOS resource sharing service as w ell as their name tables and         Nsasoft products may be found in
NetBIOS connections. After the NetBios audit process is over you w ill get general information about the remote             businesses all over the w orld,
computer including IP Address, Machine , Workgroup, Sharing, Ethernet Address, Adapter Producer. Also you w ill             including international companies,
get information about w orkstation users, groups, machines. For each selected option ( Users, Users Log, Machines,          non profit & government agencies,
Groups ) the appropriate fields w ill be show n. The w orkstation info w ill be available too. For each selected option (   educational organizations.
NB Names, Services, Programs, Info, Hotfixes, Run, URLs) the appropriate fields w ill be show n. You w ill also get the              MORE CUSTOMERS »
information about Account Policies ( including Policy and Security Setting ) and Shared Resources. The information
about Shared Resources depends on the selected option ( Shares, Hidden Shares, Connection , Brow ser Helper
Objects ).

MS SQL SERVER AUDITOR
This tool allow s to perform an audit on a machine running MS SQL server.



                                                                                                                                 converted by Web2PDFConvert.com
SNMP AUDITOR
SNMP auditor is a tool that allow s to w alk through all SNMP MIBs of your nodes and to audit SNMP community
names using values stored in xml database.

PACKET FILTER
Packet Filter provides a real-time netw ork PACKET FILTERING a nd analyzing. PACKET SNIFFER filters the packet by all IP,
ICMP, TCP, UDP, NETBIOS-SSN packet header fields.

PACKET EDITOR
Packet Editor is a tool to decode IP, ICMP, TCP, UDP, NETBIOS-SSN packets.

SUN RPC AUDITOR
Audit Sun RPC uses ONCRPC (Sun RPC) protocols to access the port mapper daemon/service that typically runs on
port 111 of UNIX or Linux machines. This tool includes a port mapper to dump w here a list of all running registered
daemons are show n.

MS RPC AUDITOR
Audit MS RPC, is a Microsoft implementation of DCE RPC. The auditor dump is a list of named pipes that are used by
W indow s RPC services as endpoints. The interface identifier associated w ith each named pipe represents the
service typically accessed w hen a given named pipe is used.

PORT SCANNER
Port Scanner is a fast TCP / UDP SCANNER, a tool that detects if certain TCP / UDP ports are open and accepts
connections. TCP scanners are usually used to check if the remote computer runs services (e.g. Telnet or FTP). The
main function of the port scanner consists in sending messages to the user-defined port list .The type of received
response indicates w hether the ports are opened. Port Scanner has the follow ing scan modes: connect scan, SYN
stealth, FIN stealth, Ping sw eep, UDP scan, NULL scan, XMAS tree, IP protocol scan, ACK scan.

WEB PROXY SCANNER
CGI probes are sent against w eb servers. This tool provides an ability to turn them off and if the user is running an
audit from a proxy server, he/she can configure the scanner to run CGI probes through that proxy.

ADWARE SCANNER
Adw are Scanner searches the registry and gives you a quick look at the Adw are, malw are and spyw are installed on
your computer or in the range of netw ork computers.

REMOTE SYSTEM OS DETECTOR
Nsauditor does OS detection and automatically creates OS fingerprints w hich are not included in database .

LM / NTLM SPIDER
LM / NTLM Spider is a passw ord audit and recovery tool. Passw ords are sources of security vulnerabilities
in different machines. This tool allow s to identify and access passw ord vulnerabilities.

DNS LOOKUP
DNS lookup converts IP addresses to hostnames and vice versa and obtains aliases. DNS lookup performs
advanced DNS queries, such as MX or CNAME. The full query list contains A, NS, MD, MF, CNAME, SOA, MB, MG, MR,
NULL, W KS, PTR, HINFO, MINFO,MX,TXT,AXFR,MAILB,MAILA,*. DNS Lookup supports checking if the host is in a Real-
time Black list for spammers "RBL ".

EMAIL VALIDATE
The Email Validate Tool is a client utility for checking the validity of an email account.

ENUMERATE COMPUTERS
Enumerate computers is a tool to enumerate computers in a domain. Depending on enumeration parameters the
tool can enumerate all computers , SQL servers , primary and backup domain controllers, etc.
PING
Ping is a tool that provides an opportunity to verify that the specified IP address exists. This tool is used to ensure
that a host you are trying to reach is accessible. Ping also can be used w ith the reachable host to see how long it
takes to get the response back. Also you can get information about the operating system of remote host .

TRACE ROUTE
Trace Route is a tool that traces the route (the specific gatew ay computers at each hop) from a client machine to
the remote host by reporting all router IP addresses betw een them. It also calculates and displays the duration
that each hop takes. Trace Route is a handy tool for both understanding w here problems exist in the Internet
netw ork and for getting a detailed sense of the Internet itself.

FINGER
Finger is a tool for discovering user information by using w ell know n finger service. Using Finger tool makes possible
to get "Abuse Address" of remote host. For example to get the abuse address of prontomail.com you should type
prontomail.com@abuse.net in the finger input section. As a result you w ill receive abuse@mailcentro.com (for
prontomail.com) in the finger response section.

WHOIS
This tool w ill lookup information on a domain, IP address, or a name. You can select a specific W hoIs Server, or you
can use the 'Default' option for the default server.
TRAFFIC EMULATOR
Netw ork Traffic Emulator generates IP / ICMP / TCP / UDP / HTTP traffic to STRESS TEST SERVERS, ROUTERS AND
FIREWALLS under heavy netw ork load. It is a very simple and fast program w hich can SIMULATE CLIENT ACTIVITY.

SIP - SESSION INITIATION PROTOCOL UDP TRAFFIC GENERATOR - FLOODER
SIP UDP traffic generator / flooder generates SIP traffic to stress test voice over IP systems, SIP programs and
implementations under heavy netw ork load. You can randomize source port, include or exclude SDP, change number
of packets to send, change SIP and SDP message templates to send various types of SIP messages INVITE, ACK,
CANCEL, OPTIONS, REGISTER, BYE .



                                                                                                                            converted by Web2PDFConvert.com
HTTP TRAFFIC GENERATOR
Http Traffic Generator is a tool that generates an http traffic to the specified URL .

REMOTE SHUTDOWN
Remote Shutdow n allow s remotely shutdow n or restart netw ork computers.

TCP/UDP CLIENT/SERVER
This is a useful tool for testing some services, firew all and intrusion detection systems. This tool also can be used
for debugging the program and configuring other netw ork tools.

PORT REDIRECTOR
This is a useful tool for testing some services, firew all and intrusion detection systems. This tool also can be used
for debugging the program and configuring other netw ork tools.

LOCAL IP, TCP, UDP and ICMP STATISTICS
This tools show s the IP, TCP, UDP and ICMP statistics. Analyzing this statistics allow s the detection
of different kinds of netw ork treatments as w ell as port scanning probes and netw ork attacks.

WEB LOG ANALYZER
Web Log Analyzer parses the default file access.log w hich is w ritten by Apache Web-server, converts it to XML
document and analyzes the output XML file.
IP ROUTING, NET TABLE
IP Tables provides the tool to retrieve an information related to interface-to-IP address mapping table, IP routing
table, IP-to-physical address mapping table. This tool show s the details about each IP address in the table. The
each part of the table contains information about IP address including address, interface index, subnet mask,
broadcast address, reasm size.
LOCAL ADDRESSING INFORMATION TABLE
This tool show s the available netw ork interfaces and their IP addresses, Netw ork Mask, Broadcast addresses, PPP,
Multicast and Loopback modes.
LOCAL NET TO MEDIA INFORMATION TABLE
This tool show s the available netw ork adapters and their MAC address, Subnet mask, Gatew ays, DNS servers,
W INS servers, DHCP, interface names ,etc.

IP / ASN COUNTRY
IP / ASN is a tool to determine w hich country an IP address or autonomous system number is assigned
to . This tool supports tw o w ays of finding the country; searching by IP address or autonomous system number.
PROCESS MONITOR
Process Monitor is a tool to display the list of the processes currently running on computer and to show
the program name, the unique process ID, the full path of program executable file, the name of the file
manufacturer, and the name of modules and kernel objects used by the selected proces s.

MAC / VENDOR LOOKUP
This tool allow s you to get information about adapter manufacturer. The only thing you need is to fill the full MAC
address ( ex. 00:80:48:2A:83:41 ) or only the first part of MAC address ( ex. 00:80:48 ).

REPORT VIEWER
Report tool allow s to view all netw ork security audit reports generated in XML or HTML format and open selected
report in an internal report view er.
DHCP Explorer
DhcpExplorer allow s you to discover DHCP servers on your local subnet or LAN and discovers DHCP server
configuration parameters.
Post Submit
Post Submit allow s to POST submit your data, URL or other information. The program includes simple database that
allow s you to submit your w eb site to the Internet's biggest search engines - directories and request domain w hois
information. The program allow s to add, edit and save your data to XML document and load it from XML file.
NetTaskExec
This tool schedules programs and commands to run on local or netw ork computers. You must have administrative
privile ge s on the netw ork computer and schedule service must be running in order to execute a command or
computer program.
Remote Windows Service Control
Services are critical system components. Running in the background, they are w idely used in the operating system
to control hardw are, monitor applications and support all system level functions. This tool controls the status of
your netw ork services and allow s to start or stop remotely.
Network Hotfix Scanner
Netw ork Hotfix Scanner is a advanced hotfix check utility that scans netw ork computers for missing hotfixes and
patches, and helps you dow nload and install them. Netw ork Hotfix Scanner gives you a quick look at the hotfixes
and patches installed or missed on any remote computer in your corporate netw ork, it tells you by colored icons
specific security bulletin rating ( critical, important, moderate ), title, description and bulletin URL.
Remote Network Statistics
Remote Netw ork Statistics displays remote netw ork computer IP, ICMP, TCP, UDP and Server statistics.
NetProcMon - Network Process Monitor
This tool allow s to monitor and kill processes on local or netw ork computers .
Removable Storage Explorer
Portable Storage Explorer displays remote netw ork computer USB devices, removable storage, CD-Rom and DVD
drive information and state, drive type, serial number, revision, device name, last cleaned time, device vendor and
more...
Intrusion Detection System based on security Events analyzer
Nsauditor have incrusted intrusion detection system based on Security Event Log analyzing.


                                                                                                                         converted by Web2PDFConvert.com
Security Event Log Monitor
Security Event Log Monitor monitors the security event logs of W indow s NT/2000/XP servers or w orkstations and
notifies of the possible intrusions/attacks by using E-mail, Net Send, Speech Recognition method or by playing user
selected voice file.
Internet Explorer cache manager - IE CacheExplorer
IeCacheExplorer displays the details of all cookies that Internet Explorer stores on your computer, reads all
information from the history file on your computer and displays the list of all URLs that you have visited. It also
allow s you to clear history, delete cookies and temporary internet files, saves the results in the file or copies to
clipboard and opens the appropriate URL.
Firewall Controls
Personal firew all provides home users and small-business ow ners w ith the highest level of protection. It stops
know n and unknow n Internet threats and blocks unw anted connections.




                                       HOME        PURCHASE       PRODUCTS     CONTACT US      SUPPORT       RESELLERS

                                                                                                          COPYRIGHT © NSASOFT LLC 6/27/2012 05:36:13 PM




                                                                                                                            converted by Web2PDFConvert.com

Más contenido relacionado

Similar a Network security-auditor

Product Key Finder - Find Product Key, Recovery and Backup
Product Key Finder - Find Product Key, Recovery and BackupProduct Key Finder - Find Product Key, Recovery and Backup
Product Key Finder - Find Product Key, Recovery and BackupNsaSoft US LLC
 
From ci to cd - LavaJug 2012
From ci to cd  - LavaJug 2012From ci to cd  - LavaJug 2012
From ci to cd - LavaJug 2012Henri Gomez
 
Service Launch - Nuage X as a SaaS platform for demos, integrations and sales
Service Launch - Nuage X as a SaaS platform for demos, integrations and salesService Launch - Nuage X as a SaaS platform for demos, integrations and sales
Service Launch - Nuage X as a SaaS platform for demos, integrations and salesHussein Khazaal
 
Brochure Swascan Overview
Brochure Swascan OverviewBrochure Swascan Overview
Brochure Swascan OverviewSara Colnago
 
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...Pranav Gontalwar
 
The Magic of Symbiotic Security
The Magic of Symbiotic SecurityThe Magic of Symbiotic Security
The Magic of Symbiotic SecurityDenim Group
 
Exotic Sun software leaflet
Exotic Sun software leafletExotic Sun software leaflet
Exotic Sun software leafletDevGem
 
System Hardening Using Ansible
System Hardening Using AnsibleSystem Hardening Using Ansible
System Hardening Using AnsibleSonatype
 
Daimler Truckscase Case Study Low
Daimler Truckscase Case Study LowDaimler Truckscase Case Study Low
Daimler Truckscase Case Study Lowelisasson
 
Avast product brochure
Avast product brochureAvast product brochure
Avast product brochureptoone
 
Honeywell Vista 15P Honeywell Vista-20P User Guide
Honeywell Vista 15P Honeywell Vista-20P User GuideHoneywell Vista 15P Honeywell Vista-20P User Guide
Honeywell Vista 15P Honeywell Vista-20P User GuideAlarm Grid
 
Westermo Edge network solutions
Westermo Edge network solutionsWestermo Edge network solutions
Westermo Edge network solutionsFabian Vandendyck
 
Představení Oracle SPARC Miniclusteru
Představení Oracle SPARC MiniclusteruPředstavení Oracle SPARC Miniclusteru
Představení Oracle SPARC MiniclusteruMarketingArrowECS_CZ
 
AXSGUARD_BR201410_web_tcm42-47246
AXSGUARD_BR201410_web_tcm42-47246AXSGUARD_BR201410_web_tcm42-47246
AXSGUARD_BR201410_web_tcm42-47246Johan Verdoodt
 

Similar a Network security-auditor (20)

Product Key Finder - Find Product Key, Recovery and Backup
Product Key Finder - Find Product Key, Recovery and BackupProduct Key Finder - Find Product Key, Recovery and Backup
Product Key Finder - Find Product Key, Recovery and Backup
 
From ci to cd - LavaJug 2012
From ci to cd  - LavaJug 2012From ci to cd  - LavaJug 2012
From ci to cd - LavaJug 2012
 
Service Launch - Nuage X as a SaaS platform for demos, integrations and sales
Service Launch - Nuage X as a SaaS platform for demos, integrations and salesService Launch - Nuage X as a SaaS platform for demos, integrations and sales
Service Launch - Nuage X as a SaaS platform for demos, integrations and sales
 
Scada assessment case study
Scada assessment case studyScada assessment case study
Scada assessment case study
 
Brochure Swascan Overview
Brochure Swascan OverviewBrochure Swascan Overview
Brochure Swascan Overview
 
Swascan
Swascan Swascan
Swascan
 
Evergent case study
Evergent case studyEvergent case study
Evergent case study
 
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
 
The Magic of Symbiotic Security
The Magic of Symbiotic SecurityThe Magic of Symbiotic Security
The Magic of Symbiotic Security
 
IKare Vulnerability Scanner - Datasheet EN
IKare Vulnerability Scanner - Datasheet ENIKare Vulnerability Scanner - Datasheet EN
IKare Vulnerability Scanner - Datasheet EN
 
Exotic Sun software leaflet
Exotic Sun software leafletExotic Sun software leaflet
Exotic Sun software leaflet
 
System Hardening Using Ansible
System Hardening Using AnsibleSystem Hardening Using Ansible
System Hardening Using Ansible
 
Evolve v2.3 data_sheet
Evolve v2.3 data_sheetEvolve v2.3 data_sheet
Evolve v2.3 data_sheet
 
Daimler Truckscase Case Study Low
Daimler Truckscase Case Study LowDaimler Truckscase Case Study Low
Daimler Truckscase Case Study Low
 
Axcellerator Pairs
Axcellerator PairsAxcellerator Pairs
Axcellerator Pairs
 
Avast product brochure
Avast product brochureAvast product brochure
Avast product brochure
 
Honeywell Vista 15P Honeywell Vista-20P User Guide
Honeywell Vista 15P Honeywell Vista-20P User GuideHoneywell Vista 15P Honeywell Vista-20P User Guide
Honeywell Vista 15P Honeywell Vista-20P User Guide
 
Westermo Edge network solutions
Westermo Edge network solutionsWestermo Edge network solutions
Westermo Edge network solutions
 
Představení Oracle SPARC Miniclusteru
Představení Oracle SPARC MiniclusteruPředstavení Oracle SPARC Miniclusteru
Představení Oracle SPARC Miniclusteru
 
AXSGUARD_BR201410_web_tcm42-47246
AXSGUARD_BR201410_web_tcm42-47246AXSGUARD_BR201410_web_tcm42-47246
AXSGUARD_BR201410_web_tcm42-47246
 

Último

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Último (20)

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

Network security-auditor

  • 1. HOME PURCHASE PRODUCTS CONTACT US SUPPORT RESELLERS Nsauditor Network Security Auditor Network security is not just a set of locked doors and passwords. A truly secure environment is an ever changing entity which requires constant care and monitoring. How Secure Is Your Network? Audit and Test Your Network Security with Nsauditor! Nsauditor Network Security Auditor - Advanced All-In-One Network Tools Suite includes more than 45 network tools and utilities for network auditing, scanning, network connections monitoring and more. Nsauditor is Network Security and Vulnerability Scanner that gives you the pow er to scan, detect and correct any potential security risk on your network. Nsauditor allow s monitoring network computers for possible vulnerabilities, checking enterprise netw ork for all potential methods that a hacker might use to attack it and create a report of potential problems that w ere found. Nsauditor helps netw ork administrators to identify security holes and flaw s in their netw orked systems. The program also includes firew all system, real-time network monitoring, packet filtering and analyzing. Nsauditor significantly reduces the total cost of netw ork management in enterprise environments by enabling IT personnel and systems administrators gather a w ide range of information from all the computers in the netw ork w ithout installing server-side applications on these computers and create a report of potential problems that w ere found. A network monitor tool provides some insight into services running locally, w ith options to dig dow n into each connection and analyze the remote system, terminate connections, block unw anted netw ork connections w ith incrusted firew all system and view data on the associated process. Overall, this is a very complete package for a surprisingly low price $69.00 ( VIEW COMPARISON CHART ) Nsauditor 1 User License ( 69.00$ ) Order Now! Top Reasons why Nsauditor is right for you: 1. No Limitations W ith Nsauditor 1 user license you can scan all computers in your company w ithout limits. Recent version: 2.4.1 2. Ease of Use Nsauditor is the easiest to use toolkit on the market. Full version for only $69.00 3. Quality We deliver highest quality and stable programs. W indow s 7/2000/XP/2003/Vista 4. Support We grant you unlimited 24 / 7 support. You'll get all future versions for free. Your softw are license is yours to use FOREVER. No monthly, Free to Try 15 Days yearly charges, you pay just a one-time purchase price! 5. Scalability We keep our softw are cost on comfortable level $69.00 6. Affordability We offer attractive discount prices for Multi-User Licenses BUY NOW | DOWNLOAD | NETWORK AUDITING DEMO | AWARDS Nsauditor Network Security Auditor Screencast PURCHASE BUY NOW MULTI-USER LICENSE PRODUCTS NSAUDITOR PRODUCT KEY EXPLORER BACKUP KEY RECOVERY SPOTAUDITOR PASSWORD RECOVER BLUEAUDITOR SHAREALARMPRO REMSHUTDOW NETSHAREWATCHER NETWORKSLEUTH FOLLOW US 9 EMAIL SUBSCRIPTION Enter your Email to be Notified of Softw are Updates: converted by Web2PDFConvert.com
  • 2. Related product: Network Software Inventory - Software License Tracking Solution! Get Updates Nsasoft Network Software Inventory is softw are license tracking solution. The softw are scans netw ork and displays complete softw are information! Nsasoft Netw ork Softw are Inventory is a POPULAR ARTICLES pow erful netw ork inventory softw are for home, office and enterprise netw orks. The softw are scans all computers on a netw ork and generates complete reports about computers softw are. It is Network Security & Vulnerability integrated IT Help Desk, Asset management & Softw are license management solution. Netw ork Network Security Software Softw are Inventory helps technicians to understand the problems w ith the softw are license Wireless Network Security compliance and the use of unauthorised softw are in the organization. Nsasoft Netw ork Softw are Inventory allow s to get a complete picture of Purchased Vs installed softw are for managing the Network Security Auditing softw are licenses. Associate the minor versions and allocate softw are licenses for all your Network Access Control "Managed Softw are" in the netw ork. Company Security Policy Home Network Security BUY NOW | DOWNLOAD | MORE INFORMATION | | 29.50$ Software Comparison Network Monitoring Computer Network Related product: Network Inventory Hardware Software Inventory - Scans network and displays complete hardware & software information Network Auditing Network Security Nsasoft Hardware Software Inventory is a pow erful netw ork inventory softw are for home, office Network Scanner and enterprise netw orks. The softw are scans all computers on a netw ork and generates complete Internet Security reports about computers hardw are and softw are. This information is added to the centralized database and then users can generate reports about each or all of the PCs on a netw ork. The Network Attack program is agent free and requires no softw are installed on remote machines. Nsasoft Hardw are Encryption Softw are Inventory - Scans netw ork and displays complete hardw are and softw are information! Firewall The softw are can export reports to Tab Delimited Txt File (.txt), Excel Workbook (.xls), CSV Comma Data Recovery Delimited (.csv), Web Page (.html) or XML Data (.xml) file, SQLLite3 Database. Highly recommended Ethical Hacking for budget-conscious companies looking for a feature rich netw ork inventory tool. WebSite Security Antivirus Software BUY NOW | DOWNLOAD | MORE INFORMATION | | 69.00$ Computer Security Information Security Cloud Computing Related product: Intrusion Detection NBMonitor Network Bandwidth Monitor - Network Monitoring Password Recovery Product Key Recovery Need to track your Internet bandwidth usage? Software License Compliance NBMonitor Network Bandwidth Monitor can Really Help Y ou to do it! As a number of ISP’s are now disconnecting customers for using “too much” bandw idth, know ing VOLUME LICENSING exactly how much you’ve dow nloaded or uploaded in a given month can be very helpful. NBMonitor tracks your Internet bandw idth (upload and dow nloads) usage, monitors all your Internet, it show s Join our Volume Licensing all the active connections you have to the Internet at any given moment and also the volume of Program and achieve substantial traffic flow ing through them. NBMonitor displays real-time details about your netw ork connections savings on purchases of 5 or more and netw ork adapter's bandw idth usage. Unlike others, it show s process names initiated netw ork Softw are licenses. connections and allow s you to set filters to capture only the traffic you are interested in. VOLUME LICENSING » BUY NOW | DOWNLOAD | MORE INFORMATION | | 17.50$ TESTIMONIALS "Very broad collection of netw ork a udit tools. We think this is one of Related product: the best integrated netw ork multi- BlueAuditor - BlueAuditor Monitors Mobile Devices in Wireless Network tools w e have looked at." BlueAuditor - Scan and Monitors mobile devices in a w ireless netw ork! BlueAuditor is a w ireless SC MAGAZINE personal area netw ork auditor and easy-to-use program for detecting and monitoring mobile devices in a w ireless netw ork. It can discover and track any mobile device w ithin a distance MORE TESTIMONIALS » betw een 1 and 100 meters and display key information about each device being detected as w ell as the services device provided. W ith the grow ing popularity of w ireless technology, BlueAuditor w ill enable netw ork administrators to effectively audit their w ireless netw orks against security AWARDS vulnerabilities associated w ith the use of mobile devices. BlueAuditor enables the user to save the data of the detected mobile devices in an .xml file and supports the most Microsoft drivers available on the market. All the mentioned features are provided w ith a user friendly graphical interface BUY NOW | DOWNLOAD | MORE INFORMATION | | 19.50$ Nsauditor Key Features AUDITOR MORE AWARDS » Netw ork Auditor is a tool to discover the netw ork services and to check them for discovering w ell know n security vulnerabilities. This tool creates an audit report in HTML and XML formats. SUPPORT Free 24 / 7 Support NETWORK MONITOR Netw ork Monitor show s detailed listings of all TCP and UDP endpoints, including the ow ning process name and Free Lifetime Upgrades details, remote address and state of TCP connections, as w ell as the host dns name, country , netw ork class, VISIT OUR SITE appropriate service name and service description. EMAIL US HERE NETBIOS AUDITOR NetBios Auditor is a tool to discover NetBios names. NetBios names are the names of the Services and Machines. NetBIOS Scanner is a pow erful and fast tool for exploring netw orks , scanning a netw ork w ithin a given range of IP CUSTOMERS addresses and for listing computers w hich offer NetBIOS resource sharing service as w ell as their name tables and Nsasoft products may be found in NetBIOS connections. After the NetBios audit process is over you w ill get general information about the remote businesses all over the w orld, computer including IP Address, Machine , Workgroup, Sharing, Ethernet Address, Adapter Producer. Also you w ill including international companies, get information about w orkstation users, groups, machines. For each selected option ( Users, Users Log, Machines, non profit & government agencies, Groups ) the appropriate fields w ill be show n. The w orkstation info w ill be available too. For each selected option ( educational organizations. NB Names, Services, Programs, Info, Hotfixes, Run, URLs) the appropriate fields w ill be show n. You w ill also get the MORE CUSTOMERS » information about Account Policies ( including Policy and Security Setting ) and Shared Resources. The information about Shared Resources depends on the selected option ( Shares, Hidden Shares, Connection , Brow ser Helper Objects ). MS SQL SERVER AUDITOR This tool allow s to perform an audit on a machine running MS SQL server. converted by Web2PDFConvert.com
  • 3. SNMP AUDITOR SNMP auditor is a tool that allow s to w alk through all SNMP MIBs of your nodes and to audit SNMP community names using values stored in xml database. PACKET FILTER Packet Filter provides a real-time netw ork PACKET FILTERING a nd analyzing. PACKET SNIFFER filters the packet by all IP, ICMP, TCP, UDP, NETBIOS-SSN packet header fields. PACKET EDITOR Packet Editor is a tool to decode IP, ICMP, TCP, UDP, NETBIOS-SSN packets. SUN RPC AUDITOR Audit Sun RPC uses ONCRPC (Sun RPC) protocols to access the port mapper daemon/service that typically runs on port 111 of UNIX or Linux machines. This tool includes a port mapper to dump w here a list of all running registered daemons are show n. MS RPC AUDITOR Audit MS RPC, is a Microsoft implementation of DCE RPC. The auditor dump is a list of named pipes that are used by W indow s RPC services as endpoints. The interface identifier associated w ith each named pipe represents the service typically accessed w hen a given named pipe is used. PORT SCANNER Port Scanner is a fast TCP / UDP SCANNER, a tool that detects if certain TCP / UDP ports are open and accepts connections. TCP scanners are usually used to check if the remote computer runs services (e.g. Telnet or FTP). The main function of the port scanner consists in sending messages to the user-defined port list .The type of received response indicates w hether the ports are opened. Port Scanner has the follow ing scan modes: connect scan, SYN stealth, FIN stealth, Ping sw eep, UDP scan, NULL scan, XMAS tree, IP protocol scan, ACK scan. WEB PROXY SCANNER CGI probes are sent against w eb servers. This tool provides an ability to turn them off and if the user is running an audit from a proxy server, he/she can configure the scanner to run CGI probes through that proxy. ADWARE SCANNER Adw are Scanner searches the registry and gives you a quick look at the Adw are, malw are and spyw are installed on your computer or in the range of netw ork computers. REMOTE SYSTEM OS DETECTOR Nsauditor does OS detection and automatically creates OS fingerprints w hich are not included in database . LM / NTLM SPIDER LM / NTLM Spider is a passw ord audit and recovery tool. Passw ords are sources of security vulnerabilities in different machines. This tool allow s to identify and access passw ord vulnerabilities. DNS LOOKUP DNS lookup converts IP addresses to hostnames and vice versa and obtains aliases. DNS lookup performs advanced DNS queries, such as MX or CNAME. The full query list contains A, NS, MD, MF, CNAME, SOA, MB, MG, MR, NULL, W KS, PTR, HINFO, MINFO,MX,TXT,AXFR,MAILB,MAILA,*. DNS Lookup supports checking if the host is in a Real- time Black list for spammers "RBL ". EMAIL VALIDATE The Email Validate Tool is a client utility for checking the validity of an email account. ENUMERATE COMPUTERS Enumerate computers is a tool to enumerate computers in a domain. Depending on enumeration parameters the tool can enumerate all computers , SQL servers , primary and backup domain controllers, etc. PING Ping is a tool that provides an opportunity to verify that the specified IP address exists. This tool is used to ensure that a host you are trying to reach is accessible. Ping also can be used w ith the reachable host to see how long it takes to get the response back. Also you can get information about the operating system of remote host . TRACE ROUTE Trace Route is a tool that traces the route (the specific gatew ay computers at each hop) from a client machine to the remote host by reporting all router IP addresses betw een them. It also calculates and displays the duration that each hop takes. Trace Route is a handy tool for both understanding w here problems exist in the Internet netw ork and for getting a detailed sense of the Internet itself. FINGER Finger is a tool for discovering user information by using w ell know n finger service. Using Finger tool makes possible to get "Abuse Address" of remote host. For example to get the abuse address of prontomail.com you should type prontomail.com@abuse.net in the finger input section. As a result you w ill receive abuse@mailcentro.com (for prontomail.com) in the finger response section. WHOIS This tool w ill lookup information on a domain, IP address, or a name. You can select a specific W hoIs Server, or you can use the 'Default' option for the default server. TRAFFIC EMULATOR Netw ork Traffic Emulator generates IP / ICMP / TCP / UDP / HTTP traffic to STRESS TEST SERVERS, ROUTERS AND FIREWALLS under heavy netw ork load. It is a very simple and fast program w hich can SIMULATE CLIENT ACTIVITY. SIP - SESSION INITIATION PROTOCOL UDP TRAFFIC GENERATOR - FLOODER SIP UDP traffic generator / flooder generates SIP traffic to stress test voice over IP systems, SIP programs and implementations under heavy netw ork load. You can randomize source port, include or exclude SDP, change number of packets to send, change SIP and SDP message templates to send various types of SIP messages INVITE, ACK, CANCEL, OPTIONS, REGISTER, BYE . converted by Web2PDFConvert.com
  • 4. HTTP TRAFFIC GENERATOR Http Traffic Generator is a tool that generates an http traffic to the specified URL . REMOTE SHUTDOWN Remote Shutdow n allow s remotely shutdow n or restart netw ork computers. TCP/UDP CLIENT/SERVER This is a useful tool for testing some services, firew all and intrusion detection systems. This tool also can be used for debugging the program and configuring other netw ork tools. PORT REDIRECTOR This is a useful tool for testing some services, firew all and intrusion detection systems. This tool also can be used for debugging the program and configuring other netw ork tools. LOCAL IP, TCP, UDP and ICMP STATISTICS This tools show s the IP, TCP, UDP and ICMP statistics. Analyzing this statistics allow s the detection of different kinds of netw ork treatments as w ell as port scanning probes and netw ork attacks. WEB LOG ANALYZER Web Log Analyzer parses the default file access.log w hich is w ritten by Apache Web-server, converts it to XML document and analyzes the output XML file. IP ROUTING, NET TABLE IP Tables provides the tool to retrieve an information related to interface-to-IP address mapping table, IP routing table, IP-to-physical address mapping table. This tool show s the details about each IP address in the table. The each part of the table contains information about IP address including address, interface index, subnet mask, broadcast address, reasm size. LOCAL ADDRESSING INFORMATION TABLE This tool show s the available netw ork interfaces and their IP addresses, Netw ork Mask, Broadcast addresses, PPP, Multicast and Loopback modes. LOCAL NET TO MEDIA INFORMATION TABLE This tool show s the available netw ork adapters and their MAC address, Subnet mask, Gatew ays, DNS servers, W INS servers, DHCP, interface names ,etc. IP / ASN COUNTRY IP / ASN is a tool to determine w hich country an IP address or autonomous system number is assigned to . This tool supports tw o w ays of finding the country; searching by IP address or autonomous system number. PROCESS MONITOR Process Monitor is a tool to display the list of the processes currently running on computer and to show the program name, the unique process ID, the full path of program executable file, the name of the file manufacturer, and the name of modules and kernel objects used by the selected proces s. MAC / VENDOR LOOKUP This tool allow s you to get information about adapter manufacturer. The only thing you need is to fill the full MAC address ( ex. 00:80:48:2A:83:41 ) or only the first part of MAC address ( ex. 00:80:48 ). REPORT VIEWER Report tool allow s to view all netw ork security audit reports generated in XML or HTML format and open selected report in an internal report view er. DHCP Explorer DhcpExplorer allow s you to discover DHCP servers on your local subnet or LAN and discovers DHCP server configuration parameters. Post Submit Post Submit allow s to POST submit your data, URL or other information. The program includes simple database that allow s you to submit your w eb site to the Internet's biggest search engines - directories and request domain w hois information. The program allow s to add, edit and save your data to XML document and load it from XML file. NetTaskExec This tool schedules programs and commands to run on local or netw ork computers. You must have administrative privile ge s on the netw ork computer and schedule service must be running in order to execute a command or computer program. Remote Windows Service Control Services are critical system components. Running in the background, they are w idely used in the operating system to control hardw are, monitor applications and support all system level functions. This tool controls the status of your netw ork services and allow s to start or stop remotely. Network Hotfix Scanner Netw ork Hotfix Scanner is a advanced hotfix check utility that scans netw ork computers for missing hotfixes and patches, and helps you dow nload and install them. Netw ork Hotfix Scanner gives you a quick look at the hotfixes and patches installed or missed on any remote computer in your corporate netw ork, it tells you by colored icons specific security bulletin rating ( critical, important, moderate ), title, description and bulletin URL. Remote Network Statistics Remote Netw ork Statistics displays remote netw ork computer IP, ICMP, TCP, UDP and Server statistics. NetProcMon - Network Process Monitor This tool allow s to monitor and kill processes on local or netw ork computers . Removable Storage Explorer Portable Storage Explorer displays remote netw ork computer USB devices, removable storage, CD-Rom and DVD drive information and state, drive type, serial number, revision, device name, last cleaned time, device vendor and more... Intrusion Detection System based on security Events analyzer Nsauditor have incrusted intrusion detection system based on Security Event Log analyzing. converted by Web2PDFConvert.com
  • 5. Security Event Log Monitor Security Event Log Monitor monitors the security event logs of W indow s NT/2000/XP servers or w orkstations and notifies of the possible intrusions/attacks by using E-mail, Net Send, Speech Recognition method or by playing user selected voice file. Internet Explorer cache manager - IE CacheExplorer IeCacheExplorer displays the details of all cookies that Internet Explorer stores on your computer, reads all information from the history file on your computer and displays the list of all URLs that you have visited. It also allow s you to clear history, delete cookies and temporary internet files, saves the results in the file or copies to clipboard and opens the appropriate URL. Firewall Controls Personal firew all provides home users and small-business ow ners w ith the highest level of protection. It stops know n and unknow n Internet threats and blocks unw anted connections. HOME PURCHASE PRODUCTS CONTACT US SUPPORT RESELLERS COPYRIGHT © NSASOFT LLC 6/27/2012 05:36:13 PM converted by Web2PDFConvert.com