ThreatSentry x64 4.0.25.0

Privacyware in Internet \ Server

ThreatSentry Windows Web server Host Intrusion Prevention software defends IIS against new and progressive attack techniques, protects network weak points, overcomes lapses in patch management, and reinforces regulatory compliance. An ISAPI filter hosted in MMC, ThreatSentry compares server requests to a knowledgebase and an evolving system baseline to detect untrusted activity and prevent attacks on Microsoft IIS. Supports Win 2000/2003, IIS...


   
 
Related Software

Log Parser Lizard 6.6.0 Lizard Labs Software  Database

Log Parser Lizard is free GUI for MS Log Parser engine and powerful log analyzer. Analyze your log files and create Excel and PDF reports in seconds. Log Parser is a very powerful, free and versatile tool that provides universal query access to text based data, such as log files, XML files, and...

Comodo Firewall 12.2.2.7036 Comodo Security solutions, Inc.  Anti-Virus Tools

Comodo's free Firewall is your first layer of defense against viruses, worms, trojans, hackers and other internet threats. Comodo's Firewall uses Default Deny Protection to prevent threats from occurring, rather than just detecting them when it's already too late. With a single click you can...

Site Logfile Explorer 2.01 Harry Klett  Log Analysers

Understand what happens on your webserver. To explore your iis, apache web log files offline. Investigate hacker attacks. Check good and bad bots access. IIS -, Apache - log file analyzer for common, combined, combined + Port + Cookie format. Very helpful tool for beginners. For small and medium...

Comodo Antivirus 12.1.0.6914 Comodo Security solutions, Inc.  Anti-Virus Tools

Comodo Antivirus is a free security solution for Windows that uses a powerful combination of antivirus, sandboxing and behavior analysis to quickly protect your computer from known and unknown malware. Our real-time scanner constantly monitors your computer for threats, protecting your from the...

Comodo Internet Security 12.1.0.6914 Comodo Security solutions, Inc.  Anti-Virus Tools

Comodo Internet Security is the awarding winning and free security solution for Windows that uses a powerful combination of antivirus, firewall, auto-sandbox, host intrusion prevention and website filtering to immediately protect your computer from all known and unknown malware. Our real-time...

TeeChart Pro ActiveX 2018 Steema Software  Components and Libraries

TeeChart ActiveX includes 60+ Chart types in 2D, 3D to visualize data. From the common Line, Bar, Area, Pie chart to the field-specific charts like Candle OHLC, Point and Figure, Volume, High-Low,BoxPlot,etc It provides a large selection Financial and Statistical Indicators that perform...

AttackTracer 1.24 Servolutions GmbH  Server

If your Windows server is reachable from the internet and you want certain services like remote desktop, FTP transfers or SQL-Server to be accessible from outside then attacking attempts on your server will definitely be made. Numerous automated attacking tools, called 'bots' are active on the...

Norton Security with Backup 2016 Symantec Corporation  Anti-Virus Utilities

Norton Security with Backup beta includes multi-device security keeps you protected, no matter how you get connected. When you download this beta, you’ll be among the first to test drive the latest pre-release version of Norton Security. None of the changes we’ve made will be directly visible...

Norton Security 2016 Symantec Corporation  Anti-Virus Utilities

Norton Security beta includes multi-device security keeps you protected, no matter how you get connected. When you download this beta, you’ll be among the first to test drive the latest pre-release version of Norton Security. None of the changes we’ve made will be directly visible to you....

Fayetracker 4.0 ISN  Misc. Internet

If you are an Internet fan, then you probably have a lot of applications running on the desktop which are related to the Internet. These applications can include web browsers, file downloading utilities, communication applications and so on. Some of these applications can be used by hackers to...