Todos os dias oferecemos software com licenças GRATUITAS que do contrário você teria que comprar!
Ax3soft Sax2 4.0 esteve disponível como oferta em 5 de março de 2010
Ax3soft Sax2 é um detector de intrusos profissional e um sistema de prevenção (IDS) usado para detectar intrusões e ataques, analisar e gerenciar a sua rede com sucesso, com captura em tempo real, monitoramento 24 horas, 7 dias por semana, análise avançada de protocolo e detecção automática.
Com acesso a todas as operações em sua rede, o Sax2 torna possível o isolamento e a resolução dos problemas de segurança de sua rede - detecção de vunerabilidades, detecção de ameaças à segurança, interpelar ações contra a segurança ou identificar sinais de ataque. E finalmente, interceptar e encerrar estas conexões.
O Sax2 oferece diversos tipos de relatórios de análise de intrusões, tais como eventos, tipo, endereço da fonte e destino dos ataques, além de diversos outros tipos de relatório. Além disso, o Sax2 permite customizar a data e o limite de tempo em que o administrador coordenará a avaliação de segurança da rede.
O Sax2 suporta os protocolos mais comuns e possui um banco de dados dos eventos. Ele irá compor um detector ativo como o Sistema de Defesa da Segurança aliado a outro software de segurança, tal como o Firewall ou um anti-vírus.
Windows 2000/XP/2003/Vista
6.92 MB
$329 (for one year)
Seems to be what many people are looking for, to make a network more secure. I always take a first look at the homepage, to get an impression about the developers. This first impression was quite good - BUT: You have to read the section "Corporate" quite carefully, to find out where that company resides. I maybe a little bit paranoid, but who shall install a packet sniffer on his network, when the developers fail to clearly state who they are and where you can find them. It has to do with openness and trust. Some countries have a law, that a website has to offer that information with 1 click. And that's for good reason!
#4
This is a commercial product which requires an annual renewal. You are getting a year for free and then you will be required to uninstall or cough up for another year. How does that make it a trojan? A trojan is a non self-replicating rogue program that says it is doing something and actually does something else. This program monitors network traffic - how is it a trojan?
Me thinks you need to do a bit of reading....
I have a Dell laptop with XP-SP3 wireless connected to my router connecting me to the internet.
I was able to download and run the software (and yes it is preregistered) but I cannot start using it because it does not detect any adapter and therefore I cannot monitor any traffic at all.
(the adapter screen is empty)
Am I doing something wrong? I don't see a way of manually add an adapter?!
It seems this software must 'see' the adapter automatically.
Is this software not to be used when connected wireless??
Feedback is appreciated very much, thank you in advance.
I use an earlier version of this program, a GOTD last year. To put it simply: When you start the program it monitors what happens at your connection to Internet. The program is rather advanced and I shall not pretend that I can use all functions but I am learning...
# 3 Molly Barton: My version of the program (SAX2 Version 3) does not monitor a USB dongle -it only works with a standard network card. Probably it is the same with your version, unfortunately.
I have found this program useful and reliable. You can monitor your network traffic if you use a router or directly through a modem.
It has helped me to solve problems with my ADSL, for example when Windows Update suddenly stopped working. I would very much appreciate if the vendor would clarify if there is a time limit to this version as #4 DrLongBear says.
This is a very trustworthy an serious company according to my experience and I very much recommend the program although the learning curve is rather steep.
#13
Andrew (Andy) Huang
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Andrew "bunnie" Huang is an American hacker, who holds a Ph.D in electrical engineering from MIT and is the author of the 2003 book Hacking the Xbox: An Introduction to Reverse Engineering. He was born in 1975.[citation needed]
He also was the first person to hack the original Xbox console.[citation needed]
Huang, along with Ken Steele, designed Chumby, an embedded computer device.[1]
[edit] Publications
olá tudo bém aquí dis que é grátis para os nossos vizitantes mas por quanto tempo obrigado
nelo
Save | Cancel