GET YOUR VULNERABILITY AND THREAT DATABASE SUBSCRIPTION
EKOLABS 2016


OCS Inventory NG 2.0rc1 released !

December 26th, 2010 | by NJ Ouchn

Open Computer and Software Inventory Next Generation (OCS inventory NG) is free software that enables users to inventory their IT assets. OCS-NG collects information about the hard- and software of networked machines running the OCS client program ("OCS Inventory Agent"). OCS can be used to visualize the inventory through a web interface. Furthermore, OCS comprises the possibility of deploying applications on the computers according to search criteria. Agent-side IpDiscover makes it possible to know the entirety of networked computers and devices


Suricata 1.1 Beta1 is available now

December 26th, 2010 | by NJ Ouchn

The Suricata Engine is an Open Source Next Generation Intrusion Detection and Prevention Engine. This engine is not intended to just replace or emulate the existing tools in the industry, but will bring new ideas and technologies to the field.


Focus on NoVirusThanks Malware Remover

December 26th, 2010 | by NJ Ouchn

NoVirusThanks Malware Remover is an application designed to detect and remove specific malware, trojans, worms and other malicious threats that can damage your computer


New URL Shortener Hijacks Browsers for DDoS

December 24th, 2010 | by NJ Ouchn

In order to outline the dangers of implicitly trusting shortened URLs, a student has launched a service which generates links that take users to their destination, but also hijack their browsers for DDo


Q4 2010 Antivirus, Backup Client and Windows OS Reports

December 24th, 2010 | by NJ Ouchn

OESIS OK is the certification program for software vendors which verifies that security applications will operate with leading network and technology solutions. Application types include everything from antivirus to VPN clients


SoftPerfect Network Scanner v5.1 released

December 24th, 2010 | by NJ Ouchn

SoftPerfect Network Scanner is a free multi-threaded IP, NetBIOS and SNMP scanner with a modern interface and many advanced features. It is intended for both system administrators and general users interested in computer security. The program pings computers, scans for listening TCP/UDP ports and displays which types of resources are shared on the network (including system and hidden).


Armitage updated to v12.22.10

December 22nd, 2010 | by NJ Ouchn

Armitage is a graphical cyber attack management tool for Metasploit that visualizes your targets, recommends exploits, and exposes the advanced capabilities of the framework. Armitage aims to make Metasploit usable for security practitioners who understand hacking but don't use Metasploit every day. If you want to learn Metasploit and grow into the advanced features, Armitage can help you



Back to Top ↑