by May 5, 2003 0 comments

A network protocol analyzer for Unix and Windows, this software can examine live network data or captured data from a disk. You can browse the captured data and view the summary and detailed information for each packet. Detailed information includes fields like source, destination, protocol, time of the day (with options) and any other information pertaining to the network packets. It has a well-organized display and you have the option of applying filters to the search results. The software has the ability to view the reconstructed stream of a TCP session. The software is shareware and requires winpcap.dll to run on a Windows machine. 

You can save the results of a stream capture as a tcpdump for archiving and comparison with other results. It gives you a host of options to store this data in many formats. 

With this utility, you can find out the sender of an e-mail by tracking the IP
address of the machine that sent the mail

Email Tracker Pro is an e-mail analysis tool that enables you to track Internet e-mail back to the sender. It can analyze the e-mail header and provide you with the IP address of the machine that sent you the e-mail. This can then be used to track down the sender. This is a useful tool to handle spam. 

This is a network monitor or sniffer that notifies you when a problem is detected, by means of a network message, e-mail, pager or SMS message, before the problem gets out of hand. It also tries to recover from the problem. It has checks for active directory, ADS, disk drive, disk space, event log (with content checking), Exchange 2000 and more. The software is a shareware with a 30-day trial. 

Password Generator
Password Generator allows you to generate any quantity of passwords with one mouse click. You do not have to think of new passwords; Password Generator does it for you. This software can generate passwords 1-32 symbols in length, can exclude dubious symbols (1, l, O, 0 etc) and has the ability to include special symbols (@, !, #, etc) into the password. It can also compose password using only symbols listed by the user in the ‘other symbols’ field. The password can even be conditioned through vowels so it can be pronounced, using special algorithms. Passwords generated can be tested for your ability to remember and type them correctly, and saved to a text file. 

With this utility
you can permanently wipe out the content from your hard disk that you don’t want to be ever recovered 

This utility will permanently delete files from your computer, so that they cannot be recovered. This utility will show you actual ASCII and hexadecimal content of your disk. Clean disk makes sure you can view and wipe out the content on your hard-disk which you do not want ever to be recovered. 

The software runs on all Windows version, Windows 95 upwards and takes up 1 MB disk space. 

This is a tool that can simulate a hack-attack on your machine. When you run the application, you will be taken to a page which shows the details of your machine that are entry-points into your system and whether or not they are visible to outsiders. It tells you what level of security your system is running on and how you can enhance your security. It’s a good tool if you want to check the efficacy of your existing firewall from time to time. There are a number of details PCAudit can get from your machine if you are not protected by some firewall, like the IP address of your machine, the name of your machine and the name of the user logged into the machine. It can even trap keystrokes and reproduce them to show you they can be logged by anyone willing to. If nothing, this tiny app will show you how vulnerable your system is and what you should do about it. 

This is a free software under the GNU/GPL. It is a simple and easy to use TCP security port scanner written in C using which the user will be able to analyze hosts and all of the different services started on them. 

Knocker is available for Linux, FreeBSD, many Unix platforms, and Windows 95/98/2000. Both a console version and a GTK+ version are available. Other versions can be found at

Pest Patrol 
This software tracks hacker tools, trojan horses, key loggers, denial-of-service attack agents, and spyware on a personal computer or small corporate networks. It can scan all or selected file types, including inside archives, scans memory for active pests and kills the processes, preventing spyware cookies from entering the system and removing existing ones. This is a shareware software.

Cookies, spyware, adware and trojans this software finds on your system can be quarantined or deleted. It provides a lot of information on the type of intrusion on your system, the level of risk it entails and the suggested action — what you should do with it. 

Shruti Pareek

No Comments so far

Jump into a conversation

No Comments Yet!

You can be the one to start a conversation.