background preloader

Tools and Utilities

Facebook Twitter

Certificate Expiry Monitor. Download the Free Nmap Security Scanner for Linux/MAC/UNIX or Windows. Nmap and Zenmap (the graphical front end) are available in several versions and formats.

Download the Free Nmap Security Scanner for Linux/MAC/UNIX or Windows

Recent source releases and binary packages are described below. Older version (and sometimes newer test releases) are available from the dist directory (and really old ones are in dist-old). For the more security-paranoid (smart) users, GPG detached signatures and SHA-1 hashes for each release are available in the sigs directory (verification instructions). Before downloading, be sure to read the relevant sections for your platform from the Nmap Install Guide. The most important changes (features, bugfixes, etc) in each Nmap version are described in the Changelog.

Nmap users are encouraged to subscribe to the Nmap-hackers mailing list. PSEXEC. S Golden Ratio Typography Calculator. With the Golden Ratio Typography Calculator, You Can...

s Golden Ratio Typography Calculator

Discover the perfect typography for your website by entering your current font size and content width Optimize your typography based on font size, line-height, width, and characters per line (CPL) Explore finely-tuned and downright sexy typographical recommendations How to Use This Killer Typography Tool Enter a font size, content width, or both. If you’d like to optimize for characters per line, you can enter an optional CPL value. Click the Set my type! Have you seen Thesis 2, the ultimate WordPress template system? Curious about the math behind this calculator? Events and Errors. Events and Errors documentation is organized by server roles and server fundamentals.

Events and Errors

Within each role and fundamental, the information is organized in a hierarchical structure, based on the logical parts of an application or service that an administrator configures or uses to perform an administrative task. This hierarchy presents an overview of the system as a whole from the management perspective. A good example is the Printing Infrastructure hierarchy. Organize your resources in an online binder - LiveBinders. 40 of the Best To-Do Apps for Personal Task Management. What was once the simple choice between using a notebook, legal pad, or stack of Post-it notes to manage your personal to-do list is now a mind-numbing decision between dozens of to-do apps.

40 of the Best To-Do Apps for Personal Task Management

Flashy apps that offer more features than you could ever use. Free apps that are so bare you wonder how they'd be helpful at all. And paid apps that look just right, but you're not sure it's worth paying the price just to find out. Wonder no more. OpenOffice and LibreOffice templates, tutorials, tips and FAQ. Tutorials/articles Calculating in text documents Cross references: How to use Cross references: working with Desktop Publishing with OOo Fields: working with.

OpenOffice and LibreOffice templates, tutorials, tips and FAQ

My Life Organized. Troubleshoot Windows Event Logs. WLAN Book. WizShark - Wi-Fi Troubleshooting Made Easy. Top 47 Log Management Tools. Operating systems, such as Windows and Unix, as well as networks such as Cisco, typically offer some native log management functionality.

Top 47 Log Management Tools

But these log and event management mechanisms fall short of consolidating the data in any meaningful way, leaving bits and pieces of event logs scattered across a network. Not to mention, many of those events are lost as a result of overwrites, creating a security and compliance problem. Third-party, comprehensive log management tools, however, offer built-in consolidation, archiving, alerting and reporting — the functionality needed to actually turn log data into useful insights.

Whether you need log management solutions for Windows, Linux or any other platform, and regardless of the number of log sources you need to monitor, there’s a log management solution that will meet your specific requirements. NOTE: The following 47 log management tools are listed in random order, not in order of performance or capabilities. 1. Key Features: Cost: 2. Change Local Admin Password on remote Computers.

Create a hidden admin account. Password is expiring notification. Check services run on domain by specific user. Social Media Monitoring, Analytics and Alerts Dashboard. Operational Intelligence, Log Management, Application Management, Enterprise Security and Compliance. Dhcp Explorer - Discover DHCP servers on your LAN. Dynamic Host Configuration Protocol (DHCP) is a client-server networking protocol and uses the same two IANA assigned ports for BOOTP: 67/udp for the server side, and 68/udp for the client side.

Dhcp Explorer - Discover DHCP servers on your LAN

A DHCP server provides configuration parameters specific to the DHCP client host requesting, generally, information required by the client host to participate on an IP network. DHCP also provides a mechanism for allocation of IP addresses to client hosts. DHCP server is a useful tool that automates the assignment of IP addresses to hundreds of workstations in your network. The server maintains a pool of IP addresses that you use to create scopes.

Speedtest.net - The Global Broadband Speed Test. Google Forms. Alpha: Examples by Topic. OUI Lookup Tool. Riverbed is Wireshark's primary sponsor and provides our funding.

OUI Lookup Tool

They also make great products. I have a lot of traffic... ANSWER: SteelCentral™ Packet Analyzer PE $29.95/yr. SimpleMind Desktop. 6 free network vulnerability scanners. Though you may know and follow basic security measures on your own when installing and managing your network and websites, you'll never be able to keep up with and catch all the vulnerabilities by yourself.

6 free network vulnerability scanners

Vulnerability scanners can help you automate security auditing and can play a crucial part in your IT security. They can scan your network and websites for up to thousands of different security risks, producing a prioritized list of those you should patch, describe the vulnerabilities, and give steps on how to remediate them. Some can even automate the patching process. Five free network analyzers worth any IT admin's time. If you work on a network, you then know the value of information.

Five free network analyzers worth any IT admin's time

Solid information leads to a strong and worry-free network (or at least as worry-free as you can manage). In order to gather that information, you need the right tools. The tools I speak of are network analyzers. Once you start looking, you can find analyzers of every shape, size, and price. Resources and Tools for IT Professionals. Syswow64 blog: Bitlocker. What is Bitlocker? Bitlocker Drive Encryption allows you to encrypt all data stored on the Windows operating system volume and configured data volumes, and by using a Trusted Platform Module (TPM), it can also help ensure the integrity of early startup components. Bitlocker was updated with the release of Windows 7 and Windows Server 2008 R2. Backing Up Bitlocker and TPM Recovery Information to AD DS Backing up recovery passwords for a Bitlocker-protected drive allows administrators to recover the drive if it is locked. This ensures that encrypted data belonging to the enterprise can always be accessed by authorized users.

Gravit – unlock your design potential. Paint.NET - Free Software for Digital Photo Editing. Emulators. Mohawk - Mohawk: A tool for verifying access-control policies. Mohawk is tool for verifying correctness of access-control policies. Tasklist. Windows Compatibility Center: Find Updates, Drivers, & Downloads for Windows 8, Windows RT and Windows 7. Network Calculators. Auditing. The Windows Filtering Platform (WFP) provides auditing of firewall and IPsec related events.

These events are stored in the system security log. The audited events are as follows. By default, auditing for WFP is disabled. Auditing can be enabled on a per-category basis through either the Group Policy Object Editor MMC snap-in, the Local Security Policy MMC snap-in, or the auditpol.exe command. For example, to enable the auditing of Policy Change events you may: Security Risk Management Guide. Published: October 15, 2004 | Updated: March 15, 2006 Click here to get the Security Risk Management Guide from the Microsoft Download Center. The Security Risk Management Guide is a technology-agnostic solution that provides a four-phased approach to risk management.

NetworkMiner - The NSM and Network Forensics Analysis Tool. NetworkMiner is a Network Forensic Analysis Tool (NFAT) for Windows (but also works in Linux / Mac OS X / FreeBSD). NetworkMiner can be used as a passive network sniffer/packet capturing tool in order to detect operating systems, sessions, hostnames, open ports etc. without putting any traffic on the network. NetworkMiner can also parse PCAP files for off-line analysis and to regenerate/reassemble transmitted files and certificates from PCAP files.

NetworkMiner collects data (such as forensic evidence) about hosts on the network rather than to collect data regarding the traffic on the network. The main user interface view is host centric (information grouped per host) rather than packet centric (information showed as a list of packets/frames). NetworkMiner has, since the first release in 2007, become a popular tool among incident response teams as well as law enforcement. NetworkMiner Professional showing files extracted from sniffed network traffic to disk. Splunk For Application Development, DevOps and APM. Iplog. Iplog is a TCP/IP traffic logger. BackTrack Linux - Penetration Testing Distribution. Top 100 Network Security Tools. Automating security configuration tasks: Security Configuration Editor; Security Services. Updated: January 21, 2005 Applies To: Windows Server 2003, Windows Server 2003 R2, Windows Server 2003 with SP1, Windows Server 2003 with SP2.

Measuring Disk Latency with Windows Performance Monitor (Perfmon) - Ask the Core Team. Wevtutil. Updated: April 17, 2012 Applies To: Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows 8. Music Text Composition Generator ( A free online music utility) The P22 Music Text Composition Generator allows any text to be converted into a musical composition. Select license. Traceroute - VisualRoute - Download Page. Qnext Secure File Sharing and Access App.

Wire Shark. Online TraceRoute - SubnetOnline.com. Nessus Vulnerability Scanner. Detect & Assess. PsExec. Introduction Utilities like Telnet and remote control programs like Symantec's PC Anywhere let you execute programs on remote systems, but they can be a pain to set up and require that you install client software on the remote systems that you wish to access. PsExec is a light-weight telnet-replacement that lets you execute processes on other systems, complete with full interactivity for console applications, without having to manually install client software. Wireshark Display Filter Examples (Filter by Port, IP, Protocol) While debugging a particular problem, sometimes you may have to analyze the protocol traffic going out and coming into your machine. Wireshark is one of the best tool used for this purpose.

How to Use Wireshark to Capture, Filter and Inspect Packets.