Hot Downloads
Home»monitore security related tags
Search Software:Search
    monitore security in tags
  • Lasso Professional Server
    Lasso Professional Server

    Provides out-of-the-box connectivity to industry leading databases, robust security administration. Lasso Professional empowers the productivity focused developer. The language is clean, clear, and consistent making new code easy to write, and on-going maintenance more productive. High-level language features significantly reduce the amount of code required to accomplish tasks compared to other languages, and integrated libraries for SOAP, XML, PDF, SMTP and many more provide turn-key efficiency for feature-rich applications. Lasso Professional Server provides out-of-the-box connectivity to industry leading databases, robust security administration, isolated environments for each application, and enables "build once, deploy anywhere" solutions through support of major operating system platforms.Use high-level Lasso syntax to write database agnostic code, or pass db-specific queries to leverage the most out of your database. Lasso allows you to change your database without requiring any re-programming. Here are some key features of "Lasso Professional Server": · Universal Binary: for new Macintosh computers with Intel processor. Lasso's Native support provides the best speed and compatibility. · AJAX: Supports Web 2.0 techniques for modern dynamic web design. Includes Lasso AJAX tags and JavaScript functions working together to enable interactive page updates. · Native Data Sources: Support for many native data sources including: Microsoft SQL Server, PostgreSQL, Oracle, MySQL, SQLite, JDBC, ODBC, FileMaker, OpenBase, and Spotlight disk indexing on Mac OS X. · Built-In LDAP Integration: Integrate Lasso with office data and login systems. · Inline Enhancements: Specify data sources within inlines for faster site setup. Return data from multiple result sets within a single inline. Allows updates and deletes on groups of records with new flexibile key field specifications. · Prepared statements: Allow faster DB operations. · Shell Support: Lasso can interact with native processes, execute shell scripts, batch files, and more. · Enhanced Site Administration: Makes more efficient use of screen real estate. View, prioritize and abort Lasso threads from within the Admin. · Email Enhancements: Direct sending to remote SMTP servers, SSL support, improved encoding speed, better support for attachments. Email merge allows a single message to be customized for many recipients. · URL Rewrite: Lasso provides direct support for rewriting URLs by creating rules within Lasso Site Administration. This allows modern, portable URLs to be supported by Lasso directly. · Encoding Support: The file and network data types have been enhanced with automatic support for character set conversions. This makes it easier than ever to read and write files in just about any character set. · Calendar Type: The new iCalendar data type allows calendard to be created entirely within Lasso. Or, calendars can be downloaded and parsed for display on any Web site. In addition, LP 8.5 has been enhanced with numerous customer feature requests including: · DNS lookup tags including reverse lookups and MX records. · Private member tags and variables within custom data types. · Short-hand syntax for inline search operations. · Better display preferences within the adminstration applications. · Documentation is now formatted on letter size paper for easier printing. · Click on the feature names on the left for more information about many of these features. Also includes the new features from Lasso 8: · The new multi-site feature allows each site on a server to be isolated in it's own process and configured with unique data sources, security settings, global variables, and more. This leads to enhanced site stability, which is great for ISPs and servers that host sites for multiple clients. · On-demand tag loading makes it easy to add or update tags while Lasso is running. LassoApps and tag libraries can now be served directly from the Lasso Professional application folder. · POP support allows emails to be downloaded directly from email servers into Lasso. Improved SMTP support better handles the sending of large volumes of mail, and automatically supports multi-part HTML messages. · Includes enterprise features such as a built-in SOAP client makes, which makes calling remote procedures as easy as calling local custom tags, Java Beans support, and a J2EE servlet Web server connector. Numerous other features make Lasso easier to use including: · Tag namespaces · New compound data types like stacks, queues, sets, and lists · Improved file upload tags · New encryption tags · New parameter tag syntax · Deprecated tag logging · And much, much more! Other Features Include: · Support for a wide range of databases and Web servers such as MySQL, MS SQL Server, Oracle, OpenBase, JDBC, ODBC, PostgreSQL, FileMaker Pro and FileMaker Server Advanced, and Spotlight disk indexing on Mac OS X. Third party connectors are available for additional data sources. And it's easy to add support for other databases using a simple, easy-to-use C Language API. Supported Web servers include Apache, Microsoft IIS and WebSTAR. · Simple tag-based markup language, LassoScript, can be embedded in Web pages and scripts. This makes it easy for non-programmers to build and serve dynamic applications, while providing advanced Web developers with the functionality they need to build and serve more sophisticated, dynamic applications. · Single point of access allows setup and management across multiple databases, saving time and money. · Broad support for industry standards, including database and Web support, as well as XML, SOAP, WSDL, J2EE and Java Beans, extends the range of applications for which Lasso is suitable for deployment. · Lasso security enables site admins to create users and groups, assign and check permission groups, and implement hierarchical authentication either by the application or the entire server. Applications automatically interface with Lasso Security without the need for custom authentication routines. · File and image manipulation means more functionality when dealing with images and PDFs, while object-oriented file tags provide more control over file operations. · Unicode support is built into Lasso at the kernel level, rather than as an add-on, making international characters available everywhere transparently and automatically. · Strong corporate backing from LassoSoft, LLC includes superior support and a 100% satisfaction guarantee. Requirements: · G5, G4, or G3 Power Macintosh computer or Intel Core Solo or Core Duo Macintosh computer. · 512 MB of RAM. More recommended. · HFS+ formatted hard drive with BSD subsystem option. · Apache Web Server (included with Mac OS X). · Apple's X11 for Mac OS X (optional install). Limitations: · 30 days trial period. What's New in This Release: [ read full changelog ] · Includes an important security update, minor fixes and documentation updates.

    Size: Download
  • Veil
    Veil

    A free database security add-on for Postgres Veil is a free and open source tool that allows databases to be created with efficient row-level access controls: different users can access different subsets of data. What's New in This Release: [ read full changelog ] · This is the first Beta release of Veil. There are new features, fixed to the build system, minor bugfixes and imnor documentation improvements

    Size: Download
  • Project37
    Project37

    A model-driven software application using an XML schema to generate security services Project37 is a model-driven software application using an XML schema to generate security services which can be used to alter GUI forms or XML data sets. Requirements: · Java

    Size: Download
  • arsecurity
    arsecurity

    A free security component for Activerecord arsecurity can manage CRUD permissions with attribute level by configuration, you can implement RBAC easily with it. arsecurity depends on the OO query tool Rquerypad(Optional) and the AOP framework Rinter(Rinterceptor). What's New in This Release: [ read full changelog ] · fix missing of require

    Size: Download
  • Sybase ASE Developer Edition
    Sybase ASE Developer Edition

    Data management system for taming the information explosion The Sybase/Apple partnership leverages the strengths of each company and, for the first time, provides Apple's developer community access to an enterprise-class database. Sybase ASE, coupled with Apple's new systems, solves problems associated with data management: query performance, managing concurrent users, data security, and fundamentally extracting value from operational data.Sybase also allows customers to integrate within larger information systems, for example, an advertising department of a newspaper can now integrate into the billing system, or a design department can integrate into production systems. Sybase/Apple partnership provides enterprise-level infrastructure allowing Apple to power enterprise-level business processes.

    Size: Download
  • Cryptlib
    Cryptlib

    Powerful security toolkit that allows you to easily add encryption and authentication services to your software cryptlib is a powerful security toolkit that allows even inexperienced crypto programmers to easily add encryption and authentication services to their software. The high-level interface provides anyone with the ability to add strong security capabilities to an application in as little as half an hour, without needing to know any of the low-level details that make the encryption or authentication work. Because of this, cryptlib dramatically reduces the cost involved in adding security to new or existing applications. At the highest level, cryptlib provides implementations of complete security services such as S/MIME and PGP/OpenPGP secure enveloping, SSL/TLS and SSH secure sessions, CA services such as CMP, SCEP, RTCS, and OCSP, and other security operations such as secure timestamping (TSP). Since cryptlib uses industry-standard X.509, S/MIME, PGP/OpenPGP, and SSH/SSL/TLS data formats, the resulting encrypted or signed data can be easily transported to other systems and processed there, and cryptlib itself runs on virtually any operating system - cryptlib doesn't tie you to a single platform. This allows email, files, and EDI transactions to be authenticated with digital signatures and encrypted in an industry-standard format. cryptlib is supplied as source code for Macintosh/OS X, FreeBSD/NetBSD/OpenBSD, HP-UX, IRIX, Linux, AMX, BeOS, ChorusOS, DOS, DOS32, eCOS, C/OS-II, embedded Linux, IBM MVS, ITRON, OS/2, PalmOS, RTEMS, Tandem. cryptlib's highly portable nature means that it is also being used in a variety of custom embedded system environments. In addition, cryptlib is available as a standard Windows DLL and an ActiveX control.. cryptlib comes with language bindings for C / C++, C# / .NET, Delphi, Java, Python, and Visual Basic (VB). cryptlib provides a standardised interface to a number of popular encryption algorithms, as well as providing a high-level interface that hides most of the implementation details and uses operating-system-independent encoding methods that make it easy to transfer secured data from one operating environment to another. Although use of the high-level interface is recommended, experienced programmers can directly access the lower-level encryption routines for implementing custom encryption protocols or methods not directly provided by cryptlib.

    Size: Download
  • DataVaultMaker
    DataVaultMaker

    DataVaultMaker offers flexible and powerful security options for FileMaker solutions DataVaultMaker has been designed specifically to offer flexible and powerful security options for FileMaker solutions. It is designed to create unique cryptosystems on demand, each depending on its own set of randomly generated cypher keys. Create a new and unique encryption system at the click of a button, enter a few details and you will instantly be ready to cut and paste the complete formulae into your FileMaker script dialogs.It sounds too simple? Well yes, in a sense, but the formulae it produces in seconds are of a level of complexity that would take an experienced developer many hours or days to write and trouble-shoot. If you've ever designed a full featured custom encryption system, you'll know that the ones that are easy to implement are not generally very effective. DataVaultMaker changes all that because for a modest price and a few mouse clicks, you will have an inexhaustible supply of tightly coded native encryption formulae for your solutions.Unlike a plug-in based tool, DataVaultMaker, once registered, gives you unlimited distribution rights, is totally cross platform and its formulae integrate right into your solution's scripts and calcs, so there are no separate '.fmx' files or complicated instructions for end-users to worry about.Main features of DataVaultMaker:seamless cross-platform support for Windows, MacOS 9 and MacOS X. Data encoded on one platform may be reliably decoded on any of the supported platformsability to encode strings of any length (limited only by FileMaker's maximum field size of 64k) at average speeds above 1k per second (on average hardware)encoding capability for number, date, time and text data formats (with the resulting encrypted strings stored in a text field or a text file)support for an 82 character alpha/numeral/symbol set, along with the capability to (optionally) specify custom character sets for each encoding/decoding formula pair - eg to provide support for foreign languages or specialised requirementsefficient scripting methodologies, with detailed script and formula definitions being provided for each cryptosystem generated (example and demo files provided to registered users)compatible with secondary processing techniques (use of escape sequences) to extend the supported character set beyond 82 in cases where this may be required (for many purposes 82 will suffice!)built-in security and password protection to safeguard your encryption keys, cryptosystems and related solution and dataefficient production of complex formulae which would take hours or days to code and troubleshoot individuallycost effective data security/encryption solution - once you purchase DataVaultMaker, you can include the code it generates in unlimited solutions and distribute them to unlimited users all FileMaker native code for maximum portability, cross-platform capability, integration and compact simplicityleading-edge point and click GUI which offers elegance, ergonomics and simplicity, with integrated online help and a host of power-user features built in.Limitations of DataVaultMaker:30 days trial.Unable to access security and cryptographic services.

    Size: Download
  • Ratproxy
    Ratproxy

    Open Source web app security audit program Ratproxy is a semi-automated, largely passive web application security audit tool. It is meant to complement active crawlers and manual proxies more commonly used for this task.Ratproxy is optimized specifically for an accurate and sensitive detection, and automatic annotation, of potential problems and security-relevant design patterns based on the observation of existing, user-initiated traffic in complex web 2.0 environments.Detects and prioritizes broad classes of security problems, such as dynamic cross-site trust model considerations, script inclusion issues, content serving problems, insufficient XSRF and XSS defenses, and much more.Ratproxy is currently believed to support Mac OS X, FreeBSD, Linux, and Windows (Cygwin) environments.The approach taken with ratproxy offers several important advantages over more traditional methods:· No risk of disruptions. In the default operating mode, tool does not generate a high volume of attack-simulating traffic, and as such may be safely employed against production systems at will, for all types of ad hoc, post-release audits. Active scanners may trigger DoS conditions or persistent XSSes, and hence are poorly suited for live platforms. · Low effort, high yield. Compared to active scanners or fully manual proxy-based testing, ratproxy assessments take very little time or bandwidth to run, and proceed in an intuitive, distraction-free manner - yet provide a good insight into the inner workings of a product, and the potential security vulnerabilities therein. They also afford a consistent and predictable coverage of user-accessible features. · Preserved control flow of human interaction. By silently following the browser, the coverage in locations protected by nonces, during other operations valid only under certain circumstances, or during dynamic events such as cross-domain Referer data disclosure, is greatly enhanced. Brute-force crawlers and fuzzers usually have no way to explore these areas in a reliable manner. · WYSIWYG data on script behavior. Javascript interfaces and event handlers are explored precisely to a degree they are used in the browser, with no need for complex guesswork or simulations. Active scanners often have a significant difficulty exploring JSON responses, XMLHttpRequest() behavior, UI-triggered event data flow, and the like. · Easy process integration. The proxy can be transparently integrated into an existing manual security testing or interface QA processes without introducing a significant setup or operator training overhead.NOTE: Ratproxy is licensed and provided under the terms of the Apache License 2.0.

    Size: Download
  • Ratproxy
    Ratproxy

    Open Source web app security audit program Ratproxy is a semi-automated, largely passive web application security audit tool. It is meant to complement active crawlers and manual proxies more commonly used for this task.Ratproxy is optimized specifically for an accurate and sensitive detection, and automatic annotation, of potential problems and security-relevant design patterns based on the observation of existing, user-initiated traffic in complex web 2.0 environments.Detects and prioritizes broad classes of security problems, such as dynamic cross-site trust model considerations, script inclusion issues, content serving problems, insufficient XSRF and XSS defenses, and much more.Ratproxy is currently believed to support Mac OS X, FreeBSD, Linux, and Windows (Cygwin) environments.The approach taken with ratproxy offers several important advantages over more traditional methods:· No risk of disruptions. In the default operating mode, tool does not generate a high volume of attack-simulating traffic, and as such may be safely employed against production systems at will, for all types of ad hoc, post-release audits. Active scanners may trigger DoS conditions or persistent XSSes, and hence are poorly suited for live platforms. · Low effort, high yield. Compared to active scanners or fully manual proxy-based testing, ratproxy assessments take very little time or bandwidth to run, and proceed in an intuitive, distraction-free manner - yet provide a good insight into the inner workings of a product, and the potential security vulnerabilities therein. They also afford a consistent and predictable coverage of user-accessible features. · Preserved control flow of human interaction. By silently following the browser, the coverage in locations protected by nonces, during other operations valid only under certain circumstances, or during dynamic events such as cross-domain Referer data disclosure, is greatly enhanced. Brute-force crawlers and fuzzers usually have no way to explore these areas in a reliable manner. · WYSIWYG data on script behavior. Javascript interfaces and event handlers are explored precisely to a degree they are used in the browser, with no need for complex guesswork or simulations. Active scanners often have a significant difficulty exploring JSON responses, XMLHttpRequest() behavior, UI-triggered event data flow, and the like. · Easy process integration. The proxy can be transparently integrated into an existing manual security testing or interface QA processes without introducing a significant setup or operator training overhead.NOTE: Ratproxy is licensed and provided under the terms of the Apache License 2.0.

    Size: Download
  • Ratproxy
    Ratproxy

    Open Source web app security audit program Ratproxy is a semi-automated, largely passive web application security audit tool. It is meant to complement active crawlers and manual proxies more commonly used for this task.Ratproxy is optimized specifically for an accurate and sensitive detection, and automatic annotation, of potential problems and security-relevant design patterns based on the observation of existing, user-initiated traffic in complex web 2.0 environments.Detects and prioritizes broad classes of security problems, such as dynamic cross-site trust model considerations, script inclusion issues, content serving problems, insufficient XSRF and XSS defenses, and much more.Ratproxy is currently believed to support Mac OS X, FreeBSD, Linux, and Windows (Cygwin) environments.The approach taken with ratproxy offers several important advantages over more traditional methods:· No risk of disruptions. In the default operating mode, tool does not generate a high volume of attack-simulating traffic, and as such may be safely employed against production systems at will, for all types of ad hoc, post-release audits. Active scanners may trigger DoS conditions or persistent XSSes, and hence are poorly suited for live platforms. · Low effort, high yield. Compared to active scanners or fully manual proxy-based testing, ratproxy assessments take very little time or bandwidth to run, and proceed in an intuitive, distraction-free manner - yet provide a good insight into the inner workings of a product, and the potential security vulnerabilities therein. They also afford a consistent and predictable coverage of user-accessible features. · Preserved control flow of human interaction. By silently following the browser, the coverage in locations protected by nonces, during other operations valid only under certain circumstances, or during dynamic events such as cross-domain Referer data disclosure, is greatly enhanced. Brute-force crawlers and fuzzers usually have no way to explore these areas in a reliable manner. · WYSIWYG data on script behavior. Javascript interfaces and event handlers are explored precisely to a degree they are used in the browser, with no need for complex guesswork or simulations. Active scanners often have a significant difficulty exploring JSON responses, XMLHttpRequest() behavior, UI-triggered event data flow, and the like. · Easy process integration. The proxy can be transparently integrated into an existing manual security testing or interface QA processes without introducing a significant setup or operator training overhead.NOTE: Ratproxy is licensed and provided under the terms of the Apache License 2.0.

    Size: Download
    monitore security in description
  • Authorization.framework
    Authorization.framework

    Authorization.framework - Objective-C wrapper around OS X Security API The Authorization.framework is a simple Objective-C wrapper around Apple's Security framework. It provides an Authorization object which can be used to authenticate users and run tools with privileges.It is simply a convinience class. I didn't like having all those Security framework calls all over the place in my code and came up with this to clean things up and make using the Security framework features easier.

    Size: Download
  • Site Security Policy
    Site Security Policy

    Firefox add-on that enables you to define website policies. Site Security Policy is a mechanism which allows websites to define policies describing how web content should behave. Such policies can indicate which JavaScript is valid or invalid, as well as how (content-initiated) cross-site requests should be treated.The Site Security Policy addon is cross-platform and it works on Mac OS X, Windows and Linux.Site Security Policy tries to improve your website security policy per website instructions.Requirements:· Firefox: 1.5 or later

    Size: Download
  • ThreatLevel
    ThreatLevel

    ThreatLevel - Menulet that will display the current Homeland Security Advisory System level of threat to US national security ThreatLevel is a free, open source and easy to usemenulet that will display the current Homeland Security Advisory System level of threat to US national security in your Mac's menubar.

    Size: Download
  • Recommendation Tracker
    Recommendation Tracker

    Creates, develops and tracks information for security guides and benchmarks The Recommendation Tracker is a free and open source program that facilitates consistent standardized (XCCDF, OVAL, CCE, CPE) guidance authoring through an established format for creating, developing, and tracking all information pertinent to security guide and benchmark generation. Requirements: · Java

    Size: Download
  • Recommendation Tracker
    Recommendation Tracker

    Creates, develops and tracks information for security guides and benchmarks The Recommendation Tracker is a free and open source program that facilitates consistent standardized (XCCDF, OVAL, CCE, CPE) guidance authoring through an established format for creating, developing, and tracking all information pertinent to security guide and benchmark generation. Requirements: · Java

    Size: Download
  • Security Manager
    Security Manager

    Network FileMaker Pro database administration tool. Security Manager will simplify database administration, enhance your data security, and ease access for users.Waves in Motion guarantees Security Manager will improve your data security, and provide a tremendous time savings, or you can return it for a full refund.

      Size: Download
    • Security Manager
      Security Manager

      Network FileMaker Pro database administration tool. Security Manager will simplify database administration, enhance your data security, and ease access for users.Waves in Motion guarantees Security Manager will improve your data security, and provide a tremendous time savings, or you can return it for a full refund.

        Size: Download
      • AccesStream
        AccesStream

        Open source and multi-platform security program Accesstream is an open source, embeddable identity, access management (IAM), security and auditing platform. AccesStream is a collection of free open source framework and security components designed to greatly simplify the process of securing your enterprise applications and integrating them into various deployment environments. What's New in This Release: [ read full changelog ] · Updated to latest version of OpenSAML · Migrated administration application from functional prototype to new API

        Size: Download
      • AccesStream
        AccesStream

        Open source and multi-platform security program Accesstream is an open source, embeddable identity, access management (IAM), security and auditing platform. AccesStream is a collection of free open source framework and security components designed to greatly simplify the process of securing your enterprise applications and integrating them into various deployment environments. What's New in This Release: [ read full changelog ] · Updated to latest version of OpenSAML · Migrated administration application from functional prototype to new API

        Size: Download
      • AccesStream
        AccesStream

        Open source and multi-platform security program Accesstream is an open source, embeddable identity, access management (IAM), security and auditing platform. AccesStream is a collection of free open source framework and security components designed to greatly simplify the process of securing your enterprise applications and integrating them into various deployment environments. What's New in This Release: [ read full changelog ] · Updated to latest version of OpenSAML · Migrated administration application from functional prototype to new API

        Size: Download

      Top Freeware

      Top shareware

      Related Search