Security Software
WindowsWindows

Cain & Abel 4.9.56
| updated 13 April 2014

Cain & Abel is a password recovery tool for Microsoft operating systems.

Password Reset 2.61
| updated 26 March 2014

Password Reset is a self-service password management system that allows users to reset their own password, even if they have forgotten their current password.

RainbowCrack 1.6
| updated 26 March 2014

RainbowCrack is an instant windows password cracker based on Philippe Oechslin's faster time-memory trade-off technique.

JSch 0.1.51
| updated 26 March 2014

JSch is a pure Java implementation of SSH2.

Advanced Host Monitor 9.82 Beta
| updated 26 March 2014

This is a network monitor program.

Mac OS XMac OS X

GPG Suite 2013.10.22
| updated 26 March 2014

Use GPG Suite to encrypt, decrypt, sign and verify files or messages. Manage your GPG Keychain with a few simple clicks and experience the full power of GPG easier than ever before.

ClamXav 2.6.2
| updated 26 March 2014

ClamXav is a freeware virus checker for Mac OS X.

Espionage 3.5.3
| updated 26 March 2014

Espionage is designed to integrate with Apple's Finder, so that you can protect only the data that you want protected, without having to resort to any special "vaults".

1Password 4.1.2
| updated 26 March 2014

1Password can create strong, unique passwords for you, remember them, and restore them, all directly in your web browser.

Data Guardian 3.1.2
| updated 26 March 2014

Data Guardian is a secure, Universal Binary, database application for storing passwords, credit card numbers, addresses, notes, customer databases, and more.

LinuxLinux

Nmap 6.40
| updated 20 August 2013

Nmap is a free and open source utility for network exploration or security auditing.

Kismet 2013-03-R1
| updated 30 March 2013

Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system.

Nikto 2.1.5
| updated 17 September 2012

Nikto is a web server scanner which performs comprehensive tests against web servers.




Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Apr 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //