Free JavaScript Editor | Home | Audio & MP3 | Business & Finance | Desktop Enhancements | Games | Home & Education 
Internet Tools | Multimedia & Design | Software Development | Utilities | Web Authoring | Miscellaneous

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z



 
Yaldex.com >> The Best Soft >> Utilities



Infiltrator Computer Network Security Scanner

A powerful Computer Network Security tool to scan, audit, and secure your computer network.

File Size: 1.32 MB License: Free to try OS: Win95, 98, Me, NT, 2000, XP Requirements: 32M RAM 20M free HD space

Infiltrator is an easy to use, intuitive computer network security scanner that can quickly audit your network computers for vulnerabilities, exploits, and information enumerations. Infiltrator can reveal and catalog a plethora of information on scanned network computers - such as installed software, shares, users, drives, hotfixes, NetBios and SNMP information, open ports and much more! All results can be generated into a sleek, easy to read report.



Vendor's Homepage       Purchase   $69.95       Download


Key Features:

  • Computer Network Security Information Gathering Infiltrator can enumerate users, file shares, drives, open ports, registry keys, installed software and hotfixes, snmp and Netbios tables, Password Polices, and much more from each computer scanned.
  • Many Useful Computer Network Security Infiltrator comes with many built in network utilities - from whois lookups and ping sweeps, to brute force cracking tools and email tracing - that help you manage your network and security with greater ease.
  • Generate Computer Network Security Sleek Scan Reports Infiltrator can generate brief or complete reports (customizable) detailing the results of all scans - helping you get an overview of your network's security as well as individual computer security levels.
  • Computer Network Security Auditing and Analysis Infiltrator can audit each scanned computer for improper registry settings, suspicious open ports, vulnerable services, scripting exploits, weak password policies, and improper user configurations.



Related Software: