Podnova Player  Windows library  Podnova home
License: All
Sort by: Relevance

Wireless security auditor review in Title/Summary

Elcomsoft Wireless Security Auditor

Elcomsoft Wireless Security Auditor

Audit security of your wireless networks and recover WPA/WPA2 with patent-pending GPU acceleration technology that speeds up password recovery if one or more compatible NVIDIA or ATI video cards are installed.

  • Publisher: ElcomSoft Co. Ltd.
  • Home page: www.elcomsoft.com
  • Last updated: May 3rd, 2023
Foundstone Socket Security Auditor

Foundstone Socket Security Auditor

Insecurely bound server sockets allow an attacker to bind his, her own socket on the same port, gaining control of the client connections and ultimately allowing the attacker to successfully steal sensitive application user information as well as launch denial of service attacks against the application server.

  • Publisher: McAfee Inc.
  • Last updated: February 20th, 2009
Proactive Security Auditor FE

Proactive Security Auditor FE

A program to assist system administrators and ordinary users to keep their computers secure by performing an audit of Windows computers for installed security updates, and allowing to download and install missing patches from Microsoft web site.

  • Publisher: ElcomSoft Co. Ltd.
  • Home page: www.elcomsoft.com
  • Last updated: July 22nd, 2008

Wireless security auditor review in Description

SX WiFi Security Suite

SX WiFi Security Suite

SX WiFi Security Suite is a collection all the wireless security tools present in SecurityXploded. You get Wi-Fi Hotspot Scanner, Network Monitor, Wi-Fi Password Decryptor, Wi-Fi Password Dump, Wi-Fi Password Key Generator, Wi-Fi Password Remover, and Wi-Fi Security Guard.

Telkom ADSL 5102G

Telkom ADSL 5102G

Features: -802.11g Wireless Access Point -Wireless Access Point including WPA wireless security -Supports virtual private network (VPN) pass through A VPN service will not be blocked from passing through the modem -Universal Plug & Play (UPnP) Compliant -Can dynamically join a network using standard TCP/IP protocol -Dynamic Domain Name System (DDNS)

  • Publisher: Telkom ADSL
  • Last updated: February 10th, 2012
WiFi Password Key Generator

WiFi Password Key Generator

WiFi Password Key Generator is exactly what its name suggests: a program that helps you create Wireless WEP and WPA/WPA2 keys on your Windows PC. These types of keys are necessary when a modem or a router requires you to provide WEP or WPA keys during a Wireless security setup.

Agnitio

Agnitio

Agnitio is an application security tool developed by David Rook to help further the adoption of the Principles of Secure Development and to bring more repeatability and integrity to security code reviews. Agnitio aims to replace the adhoc nature of manual security code review documentation, create an audit trail and reporting.

  • Publisher: David Rook
  • Home page: sourceforge.net
  • Last updated: September 22nd, 2020
WindSync

WindSync

WindSync is a powerful application which is used to wirelessly connect to your Windspire or configure it. To monitor Windspire status, or record Windspire power performance, WindSync must be connected to the Windspire via wireless modem. To review graphs of recorded Windspire power performance, WindSync may be either connected or disconnected.

  • Publisher: Windspire Energy
  • Last updated: April 25th, 2012

Additional Wireless security auditor review selection

Nsauditor Network Security Auditor

Nsauditor Network Security Auditor

Nsauditor Network Security Auditor is the best network security scanner that allows to audit and monitor remote network computers for possible vulnerabilities, checks your network for all potential methods that a hacker might use to attack it.

  • Publisher: Nsasoft US LLC
  • Last updated: December 8th, 2022
WiFi Protector

WiFi Protector

WiFi Protector scans the WiFi connection that you use for security problems. It uses 256-bit encryption which protects you from identity theft. It also hides your real IP address and gives you anonymity while browsing the Internet. It can also replace a traditional antivirus program.

  • Publisher: Optimal Software s.r.o.
  • Last updated: July 22nd, 2015
SMAC

SMAC

SMAC is a network utility for Windows computers. This application is the most popular solution for tampering with your MAC address. A MAC address is a set of numbers and letters. Ideally, a MAC address should be unique to a single device. In other words, your computer's network card and your router should not have the same address.

Watcher Security Auditor

Watcher Security Auditor

Watcher is a passive threat analyzer for HTTP based web applications. This program scans any activity of web browser applications and is very helpful to test and find security issues. It records all the activities and colors those that need attention and further analysis.

  • Publisher: Casaba Security, LLC.
  • Last updated: October 6th, 2009
QSS Installation Program

QSS Installation Program

Traditionally, users would have to manually create a wireless network name (SSID), manually enter a creative, yet predictable security key on both the access point and the client to prevent unwanted access to their wireless network. By using QSS function you can connect to your wireless network with worry-free wireless security configuration.

  • Publisher: TP-LINK
  • Last updated: February 18th, 2010
Wi-Fi Scanner

Wi-Fi Scanner

Wi-Fi Scanner allows you to easily locate visible wireless networks and corresponding information. The tool obtains the network name (SSID), signal strength (RSSI) and quality, MAC address (BSSID), channel, maximum and achievable data rate, security, and much more.

  • Publisher: LizardSystems
  • Home page: lizardsystems.com
  • Last updated: December 8th, 2022
UFO Wardriving

UFO Wardriving

The program can be used for testing the security of wireless networks. It tries to detect the passwords based on the router model. This works because many models of routers generate passwords using an algorithm. Ufo Wardriving can find the passwords using the network name and MAC address.

  • Publisher: Cristian Steri
  • Last updated: May 19th, 2013
Odyssey Client

Odyssey Client

The Juniper Networks Odyssey Access Client FIPS Edition offers the secure connectivity demanded by global public and private sector organizations. It incorporates the Odyssey Access Client features with FIPS 140-2 Level 1 validated cryptography. This software delivers secure connectivity for global enterprises.

  • Publisher: Funk Software
  • Last updated: May 17th, 2010
iPig Client

iPig Client

Secure your wireless connections now: If you have a firewall software installed (e.g. Zonealarm or Norton Internet Security), you need to allow iPig outgoing and "act as a server" Internet access if your software asks. iPig needs this in order to catch and encrypt your Internet traffic

  • Publisher: iOpus Software GmbH
  • Last updated: February 26th, 2010
VisualCodeGrepper

VisualCodeGrepper

VisualCodeGrepper is an automated code security review tool for C++, C#, VB, PHP, Java and PL/SQL which is intended to drastically speed up the code review process by identifying bad/insecure code. It attempts to find phrases within comments that can indicate broken code and it provides stats and a pie chart.