Elcomsoft Wireless Security Auditor 5.4.276.0

ElcomSoft Co. Ltd. in Security & Privacy

Elcomsoft Wireless Security Auditor 5.4.276.0

Elcomsoft Wireless Security Auditor allows network administrators to verify how secure a companyOCOs wireless network is by executing an audit of accessible wireless networks. Featuring patent-pending cost-efficient GPU acceleration technologies, Elcomsoft Wireless Security Auditor attempts to recover the original WPA/WPA2-PSK text passwords in order to test how secure your wireless environment is. Features and Benefits * Determine how...


   
 
Related Software

My WiFi Hotspot 5.0 Rogosoft Corporation  Optimize Connection

Share your Internet connection from one PC to other PC or mobile devices without using a WiFi router. If you have a PC that has a wired Internet connection and a wireless network card, you can definitely let your other PC or phone or tablet access the Internet. My WiFi Hotspot software quickly...

JRecoverer for MS SQL Server Passwords 1.4.0 LCPSoft  Password Managers

JRecoverer for Microsoft SQL Server Passwords is a user account password auditing and recovery tool for Microsoft SQL Server database. The key advantage of the application is that its cross-platform. It can be successfully installed and run on various platforms: Windows, Mac OS or Linux....

JRecoverer for PostgreSQL Passwords 1.4.0 LCPSoft  Password Managers

JRecoverer for PostgreSQL Passwords is a user account password auditing and recovery tool for PostgreSQL database. The key advantage of the application is that its cross-platform. It can be successfully installed and run on various platforms: Windows, Mac OS or Linux. Account information...

JRecoverer for MySQL Passwords 1.4.0 LCPSoft  Password Managers

JRecoverer for MySQL Passwords is a user account password auditing and recovery tool for MySQL database. The key advantage of the application is that its cross-platform (Windows, Mac OS or Linux). Account information import: import from database, import from a text file. Password recovery...

JRecoverer for Oracle Database Passwords 1.4.0 LCPSoft  Password Managers

JRecoverer for Oracle Database Passwords is a user account password auditing and recovery tool for Oracle Database. The key advantage of the application is that its cross-platform (Windows, Mac OS or Linux). Account information import: import from database (basic connection type with an SID or...

Print Inspector 7.0.8 SoftPerfect  Printing

Print Inspector is a powerful print management and auditing solution for your corporate network. It records detailed information about all printed documents, including the document name, date, number of pages, name of the user who printed the document, name of the computer from which that...

SoftPerfect File Access Monitor 1.0.1 SoftPerfect  File & Disk Management

SoftPerfect File Access Monitor is a multipurpose tool that monitors access to your files and keeps detailed history of who read, wrote and manipulated them. SoftPerfect File Access Monitor can be used on a file server to track network users activity, as well as on a local computer where it will...

SterJo Wireless Network Scanner 1.0 SterJo Software  Network Monitors

SterJo Wireless Network Scanner is a small tool that scans your network in a few seconds and displays a list of all connected computers or devices. It also could detect a mobile or any other portable device that is already connected to your network. For each device it will show the IP address,...

Cobynsofts AD Bitlocker Password Audit 1.3 Cobynsoft  Security

Cobynsofts AD Bitlocker Password Audit is a Windows utility for querying your Active Directory for all or selected computer objects and returning their recovery password in a grid-view format giving you a quick overview of the status of your current password recovery capabilities. With the...

SecureVue STIG Profiler 1.0 EiQ Networks  Networking

The SecureVue STIG Profiler is a free tool that automatically identifies IT assets and determines which DISA STIGs apply, based upon attributes like installed software. Auditing device configurations against a secure standard like the DISA STIGs is a critical defense against cyberattacks....