Wireless security auditor review in Title/Summary
Elcomsoft Wireless Security Auditor
Audit security of your wireless networks and recover WPA/WPA2 with patent-pending GPU acceleration technology that speeds up password recovery if one or more compatible NVIDIA or ATI video cards are installed.
- Publisher: ElcomSoft Co. Ltd.
- Home page: www.elcomsoft.com
- Last updated: November 18th, 2024
Foundstone Socket Security Auditor
Insecurely bound server sockets allow an attacker to bind his, her own socket on the same port, gaining control of the client connections and ultimately allowing the attacker to successfully steal sensitive application user information as well as launch denial of service attacks against the application server.
- Publisher: McAfee Inc.
- Last updated: February 20th, 2009
Proactive Security Auditor FE
A program to assist system administrators and ordinary users to keep their computers secure by performing an audit of Windows computers for installed security updates, and allowing to download and install missing patches from Microsoft web site.
- Publisher: ElcomSoft Co. Ltd.
- Last updated: November 18th, 2024
Wireless security auditor review in Description
SX WiFi Security Suite
SX WiFi Security Suite is a collection all the wireless security tools present in SecurityXploded. You get Wi-Fi Hotspot Scanner, Network Monitor, Wi-Fi Password Decryptor, Wi-Fi Password Dump, Wi-Fi Password Key Generator, Wi-Fi Password Remover, and Wi-Fi Security Guard.
- Publisher: SecurityXploded
- Home page: securityxploded.com
- Last updated: May 27th, 2020
Telkom ADSL 5102G
Features: -802.11g Wireless Access Point -Wireless Access Point including WPA wireless security -Supports virtual private network (VPN) pass through A VPN service will not be blocked from passing through the modem -Universal Plug & Play (UPnP) Compliant -Can dynamically join a network using standard TCP/IP protocol -Dynamic Domain Name System (DDNS)
- Publisher: Telkom ADSL
- Last updated: February 10th, 2012
WiFi Password Key Generator
WiFi Password Key Generator is exactly what its name suggests: a program that helps you create Wireless WEP and WPA/WPA2 keys on your Windows PC. These types of keys are necessary when a modem or a router requires you to provide WEP or WPA keys during a Wireless security setup.
- Publisher: SecurityXploded
- Home page: securityxploded.com
- Last updated: December 8th, 2022
Agnitio
Agnitio is an application security tool developed by David Rook to help further the adoption of the Principles of Secure Development and to bring more repeatability and integrity to security code reviews. Agnitio aims to replace the adhoc nature of manual security code review documentation, create an audit trail and reporting.
- Publisher: David Rook
- Last updated: September 22nd, 2020
WindSync
WindSync is a powerful application which is used to wirelessly connect to your Windspire or configure it. To monitor Windspire status, or record Windspire power performance, WindSync must be connected to the Windspire via wireless modem. To review graphs of recorded Windspire power performance, WindSync may be either connected or disconnected.
- Publisher: Windspire Energy
- Last updated: April 25th, 2012
Additional Wireless security auditor review selection
Nsauditor Network Security Auditor
Nsauditor Network Security Auditor is the best network security scanner that allows to audit and monitor remote network computers for possible vulnerabilities, checks your network for all potential methods that a hacker might use to attack it.
- Publisher: Nsasoft US LLC
- Home page: www.nsauditor.com
- Last updated: December 8th, 2022
WiFi Protector
WiFi Protector scans the WiFi connection that you use for security problems. It uses 256-bit encryption which protects you from identity theft. It also hides your real IP address and gives you anonymity while browsing the Internet. It can also replace a traditional antivirus program.
- Publisher: Optimal Software s.r.o.
- Last updated: July 22nd, 2015
SMAC
SMAC is a network utility for Windows computers. This application is the most popular solution for tampering with your MAC address. A MAC address is a set of numbers and letters. Ideally, a MAC address should be unique to a single device. In other words, your computer's network card and your router should not have the same address.
- Publisher: KLC Consulting, Inc.
- Home page: www.klcconsulting.net
- Last updated: September 11th, 2008
Watcher Security Auditor
Watcher is a passive threat analyzer for HTTP based web applications. This program scans any activity of web browser applications and is very helpful to test and find security issues. It records all the activities and colors those that need attention and further analysis.
- Publisher: Casaba Security, LLC.
- Last updated: October 6th, 2009
QSS Installation Program
Traditionally, users would have to manually create a wireless network name (SSID), manually enter a creative, yet predictable security key on both the access point and the client to prevent unwanted access to their wireless network. By using QSS function you can connect to your wireless network with worry-free wireless security configuration.
- Publisher: TP-LINK
- Last updated: February 18th, 2010
Wi-Fi Scanner
Wi-Fi Scanner allows you to easily locate visible wireless networks and corresponding information. The tool obtains the network name (SSID), signal strength (RSSI) and quality, MAC address (BSSID), channel, maximum and achievable data rate, security, and much more.
- Publisher: LizardSystems
- Home page: lizardsystems.com
- Last updated: December 8th, 2022
UFO Wardriving
The program can be used for testing the security of wireless networks. It tries to detect the passwords based on the router model. This works because many models of routers generate passwords using an algorithm. Ufo Wardriving can find the passwords using the network name and MAC address.
- Publisher: Cristian Steri
- Last updated: May 19th, 2013
Odyssey Client
The Juniper Networks Odyssey Access Client FIPS Edition offers the secure connectivity demanded by global public and private sector organizations. It incorporates the Odyssey Access Client features with FIPS 140-2 Level 1 validated cryptography. This software delivers secure connectivity for global enterprises.
- Publisher: Funk Software
- Last updated: May 17th, 2010
iPig Client
Secure your wireless connections now: If you have a firewall software installed (e.g. Zonealarm or Norton Internet Security), you need to allow iPig outgoing and "act as a server" Internet access if your software asks. iPig needs this in order to catch and encrypt your Internet traffic
- Publisher: iOpus Software GmbH
- Last updated: February 26th, 2010
VisualCodeGrepper
VisualCodeGrepper is an automated code security review tool for C++, C#, VB, PHP, Java and PL/SQL which is intended to drastically speed up the code review process by identifying bad/insecure code. It attempts to find phrases within comments that can indicate broken code and it provides stats and a pie chart.
- Publisher: VCG
- Last updated: April 29th, 2014