Practical threat analysis in Title/Summary
Microsoft Threat Analysis and Modeling
The challenge has been the difficulty in adopting threat modeling practice for software application development. Over the past two years, the Microsoft Application Consulting; Engineering (ACE) team developed a process that allows non-security subject matter experts to produce feature-rich threat models.
- Publisher: Microsoft Corporation
- Last updated: March 21st, 2012
SDL Threat Modeling Tool
As part of the design phase of the SDL, threat modeling allows software architects to identify and mitigate potential security issues early, when they are relatively easy and cost-effective to resolve. Therefore, it helps reduce the total cost of development.
- Publisher: Microsoft
- Last updated: December 3rd, 2021
Navy Threat Screensaver
Navy Threat Screensaver brings the pride of the Navy to your desktop. This unique screensaver will allow you to visit a real submarine as it navigates the oceans of the world maintaining peace and protecting its country. The different views, even from the highest point of the submarine are great.
- Publisher: FullScreensavers.com
- Home page: www.fullscreensavers.com
- Last updated: April 2nd, 2018
Practical threat analysis in Description
SpyBHORemover
Spy BHO Remover is an advanced tool to explore and remove malicious Internet Explorer addons from your PC. It not only performs heuristic based threat analysis but also provides Online Threat Verification mechanism which makes it easy to differentiate between legitimate and malicious BHOs.
- Publisher: SecurityXploded Inc
- Home page: securityxploded.com
- Last updated: May 3rd, 2023
Spy BHO Remover
Spy BHO Remover is an advanced tool to explore and remove Malicious BHO's from your system. The program helps in the quick identification and removal of such spy BHO's present in the system. It not only performs heuristic-based threat analysis but also provides an Online Threat Verification mechanism, which makes it easy to differentiate between legitimate and malicious BHOs.
- Publisher: SecurityXploded
- Home page: securityxploded.com
- Last updated: March 14th, 2017
AccuWin Pro
The Oscar 2™ system from SunTech Medical sets the standard in ambulatory blood pressure monitoring by giving clinicians practical interpretive analysis and reporting tools. AccuWin Pro is a user friendly, Windows® based program that allows maximum flexibility for configuration, analysis, interpretation and reporting of ABPM studies.
- Publisher: SunTech Medical
- Home page: www.suntechmed.com
- Last updated: May 28th, 2012
Advanced Windows Service Manager
Advanced Win Service Manager is the specialized software for smarter analysis of Windows Services.
- Publisher: SecurityXploded
- Home page: securityxploded.com
- Last updated: February 15th, 2017
ThreatExpert Memory Scanner
This memory scanner from ThreatExpert looks to be really a thorough threat detecting software. It does identify anything and everything that can be a potential threat to the system. While it’s not a run-time application like an antivirus that prevents threats from downloading, it has greater capabilities than antivirus software to identify potential risks already residing in the system memory.
- Publisher: Threat Expert Ltd.
- Last updated: April 8th, 2008
Additional Practical threat analysis selection
AdvancedWinServiceManager
Advanced Win Service Manager is the specialized software for smarter analysis of Windows Services. The application can help you detect malicious services easily from hundreds of running services. You can then use integrated online scan module to further verify it through one of online services such as VirusTotal, ProcessLibrary, Google etc.
- Publisher: SecurityXploded
- Home page: www.securityxploded.com
- Last updated: August 3rd, 2016
Autorun File Remover
Autorun File Remover can scan and remove Autorun Virus file (autorun.inf) from your Windows PC. Autorun is the built-in feature of Windows that allows applications to run automatically from USB/CD drives as soon as they are inserted. This feature is often exploited by Viruses to spread from one system to another.
- Publisher: SecurityXploded
- Home page: securityxploded.com
- Last updated: April 3rd, 2018
Trend Micro Endpoint Application Control Agent
Controls and prevents unwanted and unknown applications from executing. Prevents potential damage from unwanted or unknown applications (executables, DLLs, Windows app store apps, device drivers, control panels, and other Portable executable (PE) files). Provides global and local real-time threat intelligence based on good file reputation data correlated across a global network
- Publisher: Trend Micro Inc.
- Home page: www.trendmicro.com
- Last updated: December 15th, 2017
UsbFix By El Desaparecido
Keeping your USB devices – be it a memory stick or an external hard disk – is just as important as putting the utmost care in preventing your computer from being infected by any virus attack. UsbFix offers you a colorful utility that will analyze your USB devices in search of any threat that may not only harm your external drives but also damage your computer, and will clean them up in a snap.
- Publisher: El Desaparecido
- Last updated: January 20th, 2016
Security Task Manager
As you probably know, Windows has a built-in tool to monitor and stop running programs and processes. However, the information it provides is too little when it comes to analyzing an application’s potential threat to your system. On the contrary, Security Task Manager, the utility being reviewed, can provide much more comprehensive data, such as file types and location.
- Publisher: A. & M. Neuber Software
- Home page: www.neuber.com
- Last updated: March 24th, 2017
Hourly Analysis Program
Carrier's Hourly Analysis Program is two powerful tools in one package. HAP provides versatile features for designing HVAC systems for commercial buildings. It also offers powerful energy analysis capabilities for comparing energy consumption and operating costs of design alternatives. By combining both tools in one package significant time savings are achieved.
- Publisher: National Institute of Building Sciences
- Last updated: September 28th, 2017
Autodesk Robot Structural Analysis Professional
Autodesk Robot Structural Analysis Professional is a software program that is part of the Autodesk family and was built to offer engineers a complete set of tools to realize simulations of structural loads and execute code compliance with the aid of Building Information Modeling.
- Publisher: Autodesk, Inc.
- Home page: www.autodesk.com
- Last updated: March 4th, 2019
Test Validation & Analysis Program
The Test Validation & Analysis Program (TVAP) includes two Excel Workbooks that are designed to be used by personnel professionals to aid in developing and validating written tests that address professional standards, the Uniform Guidelines on Employee Selection Procedures (1978), and relevant court cases.
- Publisher: Biddle Consulting Group, Inc.
- Last updated: December 14th, 2011
COMODO Cloud Antivirus
Comodo Cloud Antivirus uses a powerful combination of virus monitoring, auto-sandbox and behavior analysis technologies to immediately protect your computer from all known and unknown malware. The cloud based scanner delivers up-to-the-second defense against the latest viruses and the Viruscope technology recognizes and blocks malicious behavior in unknown files.
- Publisher: COMODO
- Home page: antivirus.comodo.com
- Last updated: May 27th, 2020
TreeSize Professional
TreeSize lets you visualize the space usage of your storage system using charts. It can scan Windows folders, FTP, WebDAV, and SharePoint servers, mobile devices, Amazon S3, and also Unix/Linux systems via SSH. You can see the size of all folders including sub-folders and break it down to the file level.
- Publisher: Joachim Marder, JAM Software
- Home page: www.jam-software.com
- Last updated: November 18th, 2024