exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 53 RSS Feed

Files

sentrysetup.exe
Posted Aug 17, 1999

Sentry 2 Professional is a computer program that can "lock down" your computer on demand, so it stays secure even when you aren't using it. You can customize the appearance of your screen while Sentry is running, and have your favorite screen savers run within Sentry. Sentry can even take messages from people who dropped by your workstation while you were away. Say someone wanted to talk to you, only to find that you were in a meeting. That person can simply leave a message through Sentry, and when you get back from your meeting, you can browse through all messages that people have left - including theirs. Sentry is ideal for people in workplaces, who may have to leave their system unexpectedly, and don't want co-workers to snoop around in their files. It's also great for teachers, parents, etc, who don't want the kids messing with their computers if it's left on. (30 day fully functional free trial). Excellent shareware from Fresh Software

SHA-256 | 07054a4fb29f28d73ae9daab0f242472b7f85951102ca70e439383dad7c35019
conseal-firewall.exe
Posted Aug 17, 1999

Conseal PC Firewall.

SHA-256 | e3eca1b6c29b90b92ae4d0cd5752f5d8e3214d07c5a85e3610aa22da25c65b0c
hideit11.zip
Posted Aug 17, 1999

A small applet that allows you to hide windows.

systems | windows
SHA-256 | c28a018f1f9c1e799a673bdd92fe7c1fd1c0f88a1b52eabdc13e7d5677eb03e6
NessusW.zip
Posted Aug 17, 1999

NessusW.zip

SHA-256 | feccb0fd2733f812f7438e55e768e79159faa04f38b429cf4c6276f4b07893b8
pdumper09.zip
Posted Aug 17, 1999

Port Dumper v0.9b - Daemon that allows you to pretend to be running various services. Win95/98/NT.

systems | windows
SHA-256 | 1f065971feed2ec2f9ca348a664c337fb8ce9cd8bf785841bb31f663e41ad243
scnsm10b.zip
Posted Aug 17, 1999

The SCNSM driver supports allocation of non-swappable memory on Windows 3.x/95/98. The principal design goal of SCNSM is to provide memory that will not be swapped to disk, under any circumstances. Typically, security applications require such memory to store private keys, passwords, and sensitive intermediate results of cryptographic calculations.

systems | windows
SHA-256 | 3a4324cd1814bfa106dba774a4dcb58fc91db6a69ab69c7c2766b030585c1983
nessusnt-980706-x86.zip
Posted Aug 17, 1999

nessusnt-980706-x86.zip

tags | x86
SHA-256 | 402a7b7fbb55c6ce5685b1c9f57fc59bd832d245bcfee7346a3d875c4d5f722c
ShareView.zip
Posted Aug 17, 1999
Authored by Enigma

allows you to see ALL shares on your system, whether hidden, System-Share or normal. Displays read/write information and plaintext decoded passwords. Allows you to toggle the System-Share bit of any existing share. Includes VC++ source code.

SHA-256 | 1dbb1a12eecacbae04c55669d0151c3b583e4e7a24e8544579a6226a3048ee51
007w32.zip
Posted Aug 17, 1999

Password protect specific sensitive applications on your PC. Modifies your .exe files to prompt for password. For Win95/NT.

systems | windows
SHA-256 | 4ed823f7da7807ce81afd44dbb84258eced4b8c8f1360b217f5cea3209723177
nessusnt-980706-src.zip
Posted Aug 17, 1999

nessusnt-980706-src.zip

SHA-256 | 7a12d4d7dfe0e60dc92ee34d7c9b0ffa6b4701c97602ab0849baf02aba28aeab
oos.zip
Posted Aug 17, 1999

Outta Site - Hide active windows, icons in the system tray, and even taskbar items. You can also enable password protection for applications. For Win95/NT.

systems | windows
SHA-256 | 3de7c6298598f4c644c5bdc2f4a85c0d7ce38cbcd4210f4ceaeb50ea1b185083
wat2.zip
Posted Aug 17, 1999

WithoutATrace v2.0 - Delete files and completely wipe away the bits in the space they occupied. For win95/NT.

systems | windows
SHA-256 | fc81491c005462d321dfb1a25bac8ec7e14e8731444c995cf826a9eeb8b38e10
mutilt.zip
Posted Aug 17, 1999

Mutilate - Destroys sensitive files beyond any hope of recovery. For Win95/NT.

systems | windows
SHA-256 | 5d6579c7ebfe9758a682c6dda0c17d995f279bca80f2c9fa9c40baa03e5e5c71
cleaner19d.zip
Posted Aug 17, 1999
Authored by Puppet

The (Multi-Trojan) Cleaner 1.9d - The (Multi-Trojan) Cleaner: attempts to detect and clean your system of the following trojans - script.ini, DMSETUP, DMSETUP2, Control aka Sockets des Troie, Back Orifice, Back Orifice hack, NetBus, NetBus 1.6, Enigma's Setup Trojan, ICQ Protector, ICQ Trojen, ICKiller, Master's Paradise, OCE, Router32b, WarTools, DeepBO, Phase-0.

tags | trojan
SHA-256 | 8ee52747b71aab692dddc40e9942319bcff3fffdbee1b26bdc07b56e9d053183
nn29.zip
Posted Aug 17, 1999

Nuke Nabber v2.9 - Up to 50 ports can be assigned to listen for TCP and UDP based attacks as well as listening for ICMP dest_unreach based attacks.

tags | udp, tcp
SHA-256 | 9ab02c491b93be85a7bfba0d25c3a1c4c9fdd0a668621bc1fe17baffa6da6389
nn29a.exe
Posted Aug 17, 1999
Authored by Puppet

NukeNabber 2.9a - Protects Win95/98/Nt against DoS attacks.

systems | windows
SHA-256 | 1fc19bc7dc0477a2d35cf3282f55cc6cb80c4649bfdee4197d8f320621e59a42
adminkit.exe
Posted Aug 17, 1999
Authored by Bardon Data Systems

WinU Remote Administration Kit - These are system administration tools for cloning WinU installations, updating and controlling WinU stations across a network, using WinU's built-in license meter management, and more.

tags | remote
SHA-256 | fba5ef6b60ef09e28dfebb8630b34bf2dfdb2c031f14163cd0a0dca3611d68d9
bdsfc.exe
Posted Aug 17, 1999
Authored by Bardon Data Systems

Full Control is a complete Windows 95/98 systems management solution. It includes security access control, time limits, logging, web-browser tracking, remote administration, helpdesk support, and many flexible configuration options.

tags | remote, web
systems | windows
SHA-256 | 16034ee8c97072951e1a25e58aed18b14b0a4b7da69e44d1eef11d44830c84ae
bdsrmcmd.exe
Posted Aug 17, 1999
Authored by Bardon Data Systems

Remote Commander - Run commands remotely on any Full Control computer on the network ... installers, maintenance programs, batch files, or anything else, from one central location.

tags | remote
SHA-256 | eb25191bfc5bdc11a57c8574c1f84020f05dd5b27580b61665b5922ca3734996
bdswinu.exe
Posted Aug 17, 1999
Authored by Bardon Data Systems

WinU is a full Windows 95/98 user interface replacement with security access control, timeout, logging, web-browser monitoring, remote administration, three levels of security control, and many flexible configuration options.

tags | remote, web
systems | windows
SHA-256 | 0e1f6e19af41540c45a2061e7dd5799bda9724ab36cb9647b370381e4810db6b
mutil211.zip
Posted Aug 17, 1999

Mutilate version 2.11 Windows 95/NT file wiper utility.

systems | windows
SHA-256 | cae85481655b6e4b0f82e6300c1d6ddf9eb8d5b5cb40d198e013c78aaea5153a
sentry58.zip
Posted Aug 17, 1999

Sentry version 5.8 - a utility that locks access to sensitive data.

SHA-256 | 94f3c04aa807c92fc05cdff7e0bfa4d6451b9e99f02aa95d19a7d39086f29fcf
enc32b20.zip
Posted Aug 17, 1999

Encryption 32 Version 2.01B

SHA-256 | a171304f1ea45fdafa84a9416603f4af43bcba52d640843f09d02114f30829af
isscmp20.zip
Posted Aug 17, 1999

ISS Enhanced Security Shell Version 3.0

tags | shell
SHA-256 | dfe884d01ef3cad045fdd605fa91520df9e66afc5b26660e5caf32ea2ecc8a82
sentry21update.exe
Posted Aug 17, 1999
Authored by Fresh Software

Updates Sentry 2.0 to Sentry 2.1.

SHA-256 | 5b6e47a618c4636fc528ad7a6b383c48633fc1ce21393d7e3b477b0bf38a464a
Page 2 of 3
Back123Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Microsoft Power Pages Misconfigurations Exposing Sensitive Data
Posted Nov 15, 2024

tags | headline, privacy, microsoft, data loss
Man Gets 5 Years For Laundering Crypto From Bitfinex Hack
Posted Nov 15, 2024

tags | headline, hacker, data loss, fraud, cryptography
Five Eyes Infosec Agencies List 2024's Most Exploited Software Flaws
Posted Nov 14, 2024

tags | headline, government, usa, canada, britain, australia, flaw, new zealand
CISA, FBI Confirm China Hacked Telecoms To Spy
Posted Nov 14, 2024

tags | headline, government, privacy, usa, phone, china, data loss, cyberwar, spyware, backdoor
Two Men Charged For Hacking US Tax Preparation Firms
Posted Nov 14, 2024

tags | headline, hacker, privacy, usa, fraud, identity theft
Iranian Threat Group Targets Aerospace Workers With Fake Job Lures
Posted Nov 14, 2024

tags | headline, hacker, fraud, phish, iran
Air National Guardsman Gets 15 Years For Leaking Docs On Discord
Posted Nov 13, 2024

tags | headline, government, usa, data loss, military
Citrix, Cisco, Fortinet Zero-Days Among 2023's Most Exploited Vulnerabilities
Posted Nov 13, 2024

tags | headline, hacker, flaw, cisco, zero day
Ivanti Patches 50 Vulnerabilities Across Several Products
Posted Nov 13, 2024

tags | headline, flaw, patch
Intel And AMD Have Released Many Advisories
Posted Nov 13, 2024

tags | headline, flaw, patch, intel
View More News →
packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close