Home  |  Editor Picks  |  New Releases  |  Submit  |  Sitemap  |  Contact  |  More...

Main Categories
Audio & MP3
Business & Finance
Games
Desktop Enhancements
Home & Education
Internet Tools
Multimedia & Design
Software Development
Utilities
Web Authoring
Mac Software

Utilities > System Utilities

Infiltrator Network Security Scanner 1.0

Infiltrator is an easy to use, intuitive computer network security scanner that can quickly audit your network computers for vulnerabilities, exploits, and information enumerations. Infiltrator can reveal and catalog a plethora of information on scanned network computers - such as installed software, shares, users, drives, hotfixes, NetBios and SNMP information, open ports and much more! All results can be generated into a sleek, easy to read report.
Download Details: Infiltrator Network Security Scanner
Version:1.0
File Size:1.32 MB
License:Shareware
Price:US$ 69.95
Order:Buy Now
Download:Download Now
Download ID:18150082
Downloads829
System:Windows XP/2000/98
Update Date:06-14-2004

Infiltrator Computer Network Security Scanner Key Features:

  • Computer Network Security Information Gathering Infiltrator can enumerate users, file shares, drives, open ports, registry keys, installed software and hotfixes, snmp and Netbios tables, Password Polices, and much more from each computer scanned.


  • Many Useful Computer Network Security Infiltrator comes with many built in network utilities - from whois lookups and ping sweeps, to brute force cracking tools and email tracing - that help you manage your network and security with greater ease.


  • Generate Computer Network Security Sleek Scan Reports Infiltrator can generate brief or complete reports (customizable) detailing the results of all scans - helping you get an overview of your network's security as well as individual computer security levels.


  • Computer Network Security Auditing and Analysis Infiltrator can audit each scanned computer for improper registry settings, suspicious open ports, vulnerable services, scripting exploits, weak password policies, and improper user configurations.





Copyright © 2003-2008 tomdownload.com - Shareware Downloads and Reviews     Privacy | Terms of Use


TomDownload