Podnova Player  Windows library  Podnova home
License: All
Sort by: Relevance

Mcq on intrusion detection system in Title/Summary

XRAY - Intrusion Detection System

XRAY - Intrusion Detection System

The XRAY-IDS is the first Intrusion Detection System only for the Windows Operating System. The constant raise in security incidents makes it even more neccessary to secure your own Network!If your System is under attack, you will know with XRAY IDS.You want to be really secure? Then you need an IDS! Only a Firewall wont help much against attacks.

  • Publisher: GroundZero Security Research & Software Developement
  • Last updated: November 23rd, 2009
Intrusion Detection System - Sax2

Intrusion Detection System - Sax2

Intrusion Detection System - Sax2 is a professional intrusion detection and prevention system (IDS) used to detect intrusion and attacks, analyze and manage your network. The program provides real-time packet capture, 24/7 network monitor, advanced protocol analysis and automatic expert detection.

  • Publisher: Ax3soft Corporate
  • Home page: www.ids-sax2.com
  • Last updated: December 16th, 2014
Cyberarms Intrusion Detection

Cyberarms Intrusion Detection

The Cyberarms Intrusion Detection protects your Windows PCs against brute force attacks and intrusion attempts. It allows you to specify the maximum number of unsuccessful logins for FTP servers, SMTP server, SQL server, etc. before they are locked. This program also logs all the successul/unsuccessful logins, which is displayed in its main window.

  • Publisher: Cyberarms
  • Last updated: October 30th, 2017

Mcq on intrusion detection system in Description

Cisco IPS Manager Express

Cisco IPS Manager Express

Cisco IPS (Intrusion Prevention System) Manager Express help you configure, tune, and manage Cisco IPS sensors, Cisco Advanced Inspection and Prevention Security Services Modules, Cisco Catalyst 6500 Series Intrusion Detection System Modules, Cisco IDS Network Modules, and Cisco IOS IPS modules. Cisco IPS is an intrusion prevention system with firewalls.

  • Publisher: Cisco Systems
  • Home page: www.cisco.com
  • Last updated: January 22nd, 2013
DeepSight Extractor

DeepSight Extractor

DeepSight Extractor allows both Intrusion Detection and firewall systems to serve as DeepSight Sensors. By design, any firewall or intrusion detection system, regardless of operating system, can submit data via Extractor. The only conditions are that Extractor has a parser for the specific firewall or IDS in use, and that the machine running Extractor has access to the firewall or IDS log files.

  • Publisher: Symantec Corporation
  • Last updated: May 28th, 2012
NEBERO

NEBERO

If you want a Unified Threat Management (UTM) solution for your organization, to manage, control & secure your network centrally, then Nebero is your best choice. With its advance capabilities and easy to use intuitive interface, managing network is a breeze. Nebero divides your network users into groups.

  • Publisher: NEBERO SYSTEMS Pvt
  • Home page: www.nebero.com
  • Last updated: December 23rd, 2009
ShareAlarmPro

ShareAlarmPro

ShareAlarmPro is both a network access control and folder monitoring utility. ShareAlarmPro allows me to easily create network shares, and I can monitor all my folders. This application provides firewall protection as well as an intrusion detection system.

HttpTrafficGen

HttpTrafficGen

HttpTrafficGen is a program that allows to generate a good amount of HTTP traffic for testing web applications, web servers, intrusion detection system and their resistance to HTTP attacks. The generated requests are sent to the specified URL. You can specify the requests count and interval between two requests.

  • Publisher: Nsasoft LLC.
  • Home page: www.nsauditor.com
  • Last updated: September 4th, 2014

Additional Mcq on intrusion detection system selection

Kismet

Kismet

Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet identifies networks by passively collecting packets and detecting standard named networks, detecting (and given time, decloaking) hidden networks, and infering the presence of nonbeaconing networks via data traffic.

WinPcap

WinPcap

WinPcap is a tool to capture and transmit network packets that is Free (open source), delivers High Performance (optimized according standards), Popular (used by many tools), Tested and Reliable (it has been available for years), easy to use for the final user (windows installer), Multi-platform (Windows NT/2000/XP/2003), commercial support in the website of CACE Technologies.

  • Publisher: Riverbed Technology
  • Home page: www.winpcap.org
  • Last updated: May 23rd, 2013
Web ID (Intrusion Detection)

Web ID (Intrusion Detection)

Web ID (Intrusion Detection) is a networking tool that helps network administrators to monitor servers. Web ID listening and monitoring is supported only for the TCP port 80. Web ID will help you to have a full description of the visitors to your server, the resources they are trying to have access to, etc.

  • Publisher: Christos Beretas
  • Last updated: August 23rd, 2018
Speccy by Piriform Ltd.

Speccy by Piriform Ltd.

Speccy is an advanced System Information tool for your PC. Speccy will give you detailed statistics on every piece of hardware in your computer. Including CPU, Motherboard, RAM, Graphics Cards, Hard Disks, Optical Drives, Audio support. Additionally Speccy adds the temperatures of your different components.

  • Publisher: Piriform Ltd.
  • Home page: www.piriform.com
  • Last updated: April 13th, 2023
Nsauditor Network Security Auditor

Nsauditor Network Security Auditor

Nsauditor Network Security Auditor is the best network security scanner that allows to audit and monitor remote network computers for possible vulnerabilities, checks your network for all potential methods that a hacker might use to attack it.

  • Publisher: Nsasoft US LLC
  • Home page: www.nsauditor.com
  • Last updated: December 8th, 2022
SpyHunter

SpyHunter

SpyHunter is a powerful, real-time anti-spyware application certified by West Coast Labs’ Checkmark Certification System and designed to assist the average computer user in protecting their PC from malicious threats. SpyHunter is automatically configured to give you optimal protection with limited interaction, so all you need to do is install it for immediate and ongoing protection.

  • Publisher: Enigma Software Group, Inc.
  • Home page: www.spyhunter.com
  • Last updated: August 1st, 2023
Security Monitor Pro

Security Monitor Pro

Security Monitor Pro is a video security and surveillance system that can make use of your webcams and IP cameras. When motion is detected, you can configure this program to create a video recording of the event, take photos, sound an alarm, or send you an email notification.

Eagle X

Eagle X

Eagle X is an IDS environment using free software. Snort IDS (www.snort.org) and IDScenter are the core of this distribution. Apache server (www.apache.org), PHP (www.php.net), MySQL (www.mysql.com) and ACID (www.cert.org/kb/acid) are used to see latest alerts in a nice front-end, using http authentication.

Free Port Scanner

Free Port Scanner

Free Port Scanner uses TCP packets to determine available hosts and open ports, service associated with port, and other important characteristics. It has a simple interface where you can enter the IP address and the range of TCP ports; after editing, simply click the "Scan" button.

Trend Micro OfficeScan

Trend Micro OfficeScan

Trend Micro™ OfficeScan™ infuses high-fidelity machine learning into a blend of threat protection techniques to eliminate security gaps across any user activity and any endpoint. It constantly learns, adapts, and automatically shares threat intelligence across your environment.

  • Publisher: Trend Micro Incorporated
  • Home page: us.trendmicro.com
  • Last updated: September 22nd, 2020