Security Software
WindowsWindows

Cain & Abel 4.9.56
| updated 13 April 2014

Cain & Abel is a password recovery tool for Microsoft operating systems.

Password Reset 2.61
| updated 26 March 2014

Password Reset is a self-service password management system that allows users to reset their own password, even if they have forgotten their current password.

RainbowCrack 1.6
| updated 26 March 2014

RainbowCrack is an instant windows password cracker based on Philippe Oechslin's faster time-memory trade-off technique.

JSch 0.1.51
| updated 26 March 2014

JSch is a pure Java implementation of SSH2.

Advanced Host Monitor 9.82 Beta
| updated 26 March 2014

This is a network monitor program.

Mac OS XMac OS X

Espionage 3.5.3
| updated 26 March 2014

Espionage is designed to integrate with Apple's Finder, so that you can protect only the data that you want protected, without having to resort to any special "vaults".

Data Guardian 3.1.2
| updated 26 March 2014

Data Guardian is a secure, Universal Binary, database application for storing passwords, credit card numbers, addresses, notes, customer databases, and more.

NetShred X 4.7.8
| updated 1 January 2013

Protect your privacy with this easy to use Internet privacy software.

LinuxLinux

ModSecurity 2.8.0
| updated 16 April 2014

ModSecurity is an open source intrusion detection and prevention engine for web applications.

Samhain 3.1.0
| updated 26 March 2014

Samhain is an open source file integrity and host-based intrusion detection system.

strongSwan 5.1.2
| updated 26 March 2014

strongSwan is a complete IPsec and IKEv1 implementation for Linux 2.4 and 2.6 kernels

Dropbear SSH Server 2014.63
| updated 26 March 2014

Dropbear is an SSH 2 server, designed to be usable in small memory environments.

Dante 1.4.0
| updated 18 November 2013

Dante is a circuit-level firewall/proxy that can be used to provide convenient and secure network connectivity to a wide range of hosts.




Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Apr 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //