Hiển thị các bài đăng có nhãn Security Tools. Hiển thị tất cả bài đăng
Hiển thị các bài đăng có nhãn Security Tools. Hiển thị tất cả bài đăng
AntiDef : Anti defacement command line tool

AntiDef : Anti defacement command line tool


Defacement Protector v1.0 : AntiDef is developed by Nir Valtman,  in order to handle with defacement attacks. This tool written in Java in a fast-and-dirty manner; However is works.


How AntiDef works?
AntiDef compares two directory paths - the web application and its backup foder. Then, it performs hash (MD5 - we need performance) on each file in the folders and a final hash on all hashed
Hash Code verifier v1.1 released - Generate Hash for multiple files

Hash Code verifier v1.1 released - Generate Hash for multiple files

Hello BTS readers, we have update our File Integrity verifying tool "Hash Code Verifier". The new version 1.1 is available to download.

Changelog:
-----------------------
recursive directory traversal: Generate hash for all files in the given folder
 Clear Table Bug fixed
 Singl File comparing issue Fixed
 Right-Click copy menu
 null file creation fixed
 Hide/Show Columns options
User interface
Download Hash Code Verifier v1.0 : A tool to verify the File Integrity

Download Hash Code Verifier v1.0 : A tool to verify the File Integrity



Hello BTS Readers,
we are happy to announce that we have released our second security tool 'Hash Code Verifier'.  Hash Code Verifier is a Cross-platform application to verify the Integrity of your download files. Hash Code verifier can be very useful if you want to check if a downloaded file is original and not corrupted or modified by hackers.

In order prevent users from such problem,
Introduction to Web Application Firewall (WAF) ~ Website Security

Introduction to Web Application Firewall (WAF) ~ Website Security

What is WAF?WAF is expanded as Web Application Firewall. WAF is server side application that controls the input and output(filter the HTTP communication).  It controls network traffic on any OSI Layer up to Application Layer.  The main purpose of WAF is to provide better protection over the top Wep Application vulnerability such as XSS(Cross Site Scripting), SQL Injection,RFI.  Daily lot of
How to Disable Social Networks from tracking you ? ~Privacy Tips

How to Disable Social Networks from tracking you ? ~Privacy Tips



I hope you read the Facebook privacy risk news. Did you know that social networking sites like Facebook, Google+, and Twitter can track your visits to any web page that uses the familiar "Like", "Follow", or "+1" buttons, even if you do not actually click these buttons? Here i am going to introduce a new security tool that will take care of your privacy.


The Priv3 Firefox extension lets you
TrueCrypt ~ Protect your files/folders with Encrypted Passwords

TrueCrypt ~ Protect your files/folders with Encrypted Passwords


Do you store your accounts id ,password or any other confidential info in plain text?  If you say yes, You must read this article.

Risks of Storing confidential data in Plain Text: Your friends or any other who has access to your pc are able to view your confidential data.  Because it is in  simple text.
Malwares/spywares are able to send the data file from your pc to Attackers system.  This
INSECT Pro 2.7 ~ Penetration security auditing and testing Tool

INSECT Pro 2.7 ~ Penetration security auditing and testing Tool

INSECT Pro 2.7 - This penetration security auditing and testing software solution is designed to allow organizations of all sizes mitigate, monitor and manage the latest security threats vulnerabilities and implement active security policies by performing penetration tests across their infrastructure and applications.

INSECT can help to build a strong security posture that is easy to use so