v

您的位置:VeryCD软件安全相关

软件资源事务区


《安全漏洞扫描软件》(Shadow Security Scanner)v7.153.294[压缩包]

  • 状态: 精华资源
  • 摘要:
    发行时间2010年
    语言英文
  • 时间: 2010/01/19 22:26:45 发布 | 2010/01/20 01:32:04 更新
  • 分类: 软件  安全相关 

king6420

精华资源: 244

全部资源: 253

相关: 分享到新浪微博   转播到腾讯微博   分享到开心网   分享到人人   分享到QQ空间   订阅本资源RSS更新   美味书签  subtitle
该内容尚未提供权利证明,无法提供下载。
中文名安全漏洞扫描软件
英文名Shadow Security Scanner
资源格式压缩包
版本v7.153.294
发行时间2010年
地区美国
语言英文
简介

IPB Image

非常专业的安全漏洞扫描软件,这是一款超级扫描工具,能扫描服务器各种漏洞,包括很多漏洞扫描、账号扫描、DOS扫描...而且漏洞数据可以随时更新。

Safety Lab Shadow Security Scanner is a Proactive Computer Network Security Vulnerability Assessment Scanner with over 5000 audits.
This is a new generation of hi-tech software (network vulnerability assessment scanner) that performed greatly in the 20th century and remains on the front line in the new millennium! Shadow Security Scanner (network vulnerability assessment scanner) has earned the name of the fastest - and best performing - security scanner in its market sector, outperforming many famous brands. Shadow Security Scanner has been developed to provide a secure, prompt and reliable detection of a vast range of security system holes. After completing the system scan, Shadow Security Scanner analyses the data collected, locates vulnerabilities and possible errors in server tuning options, and suggests possible ways of problem solution. Shadow Security Scanner employs a unique system security analysis algorithm based on a patented "intellectual core". Shadow Security Scanner performs the system scan at such a speed and with such a precision so as to be able to compete with the professional IT security services and hackers, attempting to break into your network.

Running on its native Windows platform, Shadow Security Scanner also scans servers built practically on any platform, successfully revealing breaches in Unix, Linux, FreeBSD, OpenBSD, Net BSD, Solaris and, of course, Windows 95/98/ME/NT/2000/XP/.NET. Because of its unique architecture, Shadow Security Scanner is the world's only security scanner able to detect faults with CISCO, HP, and other network equipment. It is also the only commercial scanner capable of tracking more than 4,000 audits per system.

Currently, the following key services supported are: FTP, SSH, Telnet, SMTP, DNS, Finger, HTTP, POP3, IMAP, NetBIOS, NFS, NNTP, SNMP, Squid (Shadow Security Scanner is the only scanner to audit proxy servers - other scanners just verify ports availability), LDAP (Shadow Security Scanner is the only scanner to audit LDAP servers - other scanners limit their actions to ports verification), HTTPS, SSL, TCP/IP, UDP, and Registry services. Because of a fully open (ActiveX-based) architecture any professional with knowledge of VC++, C++ Builder or Delphi may easily expand the capabilities of the Scanner. ActiveX technology also enables the system administrators to integrate Shadow Security Scanner into practically any ActiveX supporting product.

As network vulnerability assessment scanner provides a direct access to its core, you may use the API (for a detailed information please refer to API documentation) to gain full control to Shadow Security Scanner or to change its properties and functions. Being not a professional programmer, but having some basic knowledge of computer networks and having found a new security breach you may either contact Safety-Lab directly or use the BaseSDK wizard: it will guide you through the whole process of new audit creation. BaseSDK also lets you add more than 95% of new audit types.

The Rules and Settings Editor will be essential for the users willing only to scan the desired ports and services without wasting time and resources on scanning other services. Flexible tuning lets system administrators manage scanning depth and other options to make benefit of speed-optimized network scanning without any loss in scanning quality.

http://www.safety-lab.com/images/SSS1.gif

更多资源请请访问:http://www.VeryCD.com/groups/langard/


引用
. '
.:
` ::
: `:
' `.
/ \
.' `.
. -- . . . -- .
. `. _ _ .' .
`._ _.' \( . )/ `._ _.'
/ `_ . _' \
:: \ : / ::
:::: `. . . | . . . .' ::::
::: :::: ```` |\ _ __.i| S!._ /| '''' :::: :::
:::... | \__________. .__________/ | ...:::
:::::: | | | | ::::::
:: _. | | | | ._ ::
. _ __\| | _______.' `._______ | |/__ _ .
._________ |_ |____. . . .____| _| _________.
_| \| | | |/ |_
. \| " | | " |/ .
. _.i(\ \ ' | | ' / /)i._ .
"""______|\ ' ` . /|______"""
| "|_\ E M B R A C E . /_|" |
___| ____ _ _ ____________ i |___
' | | |/ "| | `
! ! ._____________ ' !
_____________ ______ _______________/ /________________ __________
_______// | _______ /_______ /_____ ______/ _______/
/ . |/ _| _/_ _/ _/ _ | /
_____/ /| " . \_ | \ ' | `.__ _____/
_______________/ |____/|_____| |____|\____________________//_____________
. ___ /_____________________| . . .
| \ / . ' | .___.' |
. ___|_ \/ |__________.| _ __| `S! _|___ .
|/ ._ `.______________. `. \|
/ |___ _ . \
/. : .\
/_|____________ .______..-' _|_\
|____________|____________ ____________|____________|
| | | |
|____________|___________|____________|
. |
|__________i|
. .
: |
| _i|
_ |_____..i|_||
`'-. "``-.!
` '
P r o u d l y . P r e s e n t s . .
. _
_________________________|( \.-.___________`-.___ _ ___________
| |
| Shadow Security Scanner v7.153.294 |
| © Safety-Lab |
| date : 17 Jan, 2oo9 size : 04 disks/5.00 MB |
| os : WinAll language : English |
| type : Security release : Incl.Keyfilemaker |
| protection : License |
|_____________________________________________________________. |
______________________________________________________
: | .' :
._ | |__________________________________________________. | _.
|/ | | \|
< __ [ r e l e a s e . i n f o ] __ >
\ | | /
\ | Safety Lab Shadow Security Scanner is a Proactive Computer | /
\| Network Security Vulnerability Assessment Scanner with over |/
` 5000 audits. '
. This is a new generation of hi-tech software (network .
: vulnerability assessment scanner) that perforShadow :
| Security Scannermed greatly in the 20th century and remains |
| on the front line in the new millennium! Shadow Security |
| Scanner (network vulnerability assessment scanner) has |
| earned the name of the fastest - and best performing - |
| security scanner in its market sector, outperforming many |
| famous brands. Shadow Security Scanner has been developed |
| to provide a secure, prompt and reliable detection of a |
| vast range of security system holes. After completing the |
| system scan, Shadow Security Scanner analyses the data |
| collected, locates vulnerabilities and possible errors in |
| server tuning options, and suggests possible ways of |
| problem solution. Shadow Security Scanner employs a unique |
| system security analysis algorithm based on a patented |
| "intellectual core". Shadow Security Scanner performs the |
| system scan at such a speed and with such a precision so as |
| to be able to compete with the professional IT security |
| services and hackers, attempting to break into your |
| network. |
| |
| INSTALL NOTES: |
| |
| 1. Install the Application |
| 2. Generate License with included Keyfilemaker |
| 3. Load License in App |
| |
| NOTE: Make sure to disable auto-updates, or your license |
| will be invalidated! If that happens, remove the following |
| Registry Key: |
| HKLM\SOFTWARE\Safety- |
| lab\ShadowSecurityScanner\Modules\SambaScan |
| __|__ __
|_ E n j o y . . . /\ \\ `
|_|_____________________________________________________ __/ \____\\
)/\ \ / /
:::::::::::::::: [ g r o u p . i n f o ] ::::::::::: " \_\/____/
_ ____________________________________________________ _ / /\
|_| /____/ \
| `" \ /
| 6000 releases! Another joyous anniversary for EMBRACE! .____\/
| We exist to serve the scene with quality releases, and |
| to help the scene maintain some vestige of its former self. |
| |
| A lot has changed since our last anniversary, and many of |
| the things we have proposed back then seem to be finally |
| getting accepted. The 0day scene is attempting to catch up |
| with today's applications by proposing a new ruleset, and |
| this is a good thing. |
| |
| Our main concern is still the future of our scene, and |
| because of this we would like to invite and challenge the |
__ __|__ talented minds of the young generations. Join the |
' // /\ scene! Educate yourselves in the art of reverse |
//____/ \__ engineering. We welcome competition, and hope that |
\ \ / / together, we can continue to tackle every protection. |
\____\/_/ |
/\ \ E M B R A C E . |
/ \____\ established in October 2000 .:: |
\ / "' . .: .:::: |
\/____. _ _______________________ ______________________________|
__/ /_
[ g r e e |_ __/ i n g s ]
i.___________________________/ /_______________________________.i
| |
| |
| SSG TMG ECLiPSE ZWT AGAiN SHOCK LND CAFE DAMN TNO BAT |
: ACME ADDICTION NULL DI AiR :
. .
. ... and to all our old members: may you one day find .
' | your way back to us! ... | `
i | | i
__| |_ From the sky we will rise and conquer like we did so _| |___
/\ __ many times before, we will show the spirit of .. __ /\
/ \__/\ ....... /\__/ \
\ / \ `:::' .. / \ /
\/_ \ :::::: ::. ` .:: :::::: `: :::::: :::::: / _\/
/ \___ _ : ...: : `:' : : ...:. : : :... : _ ___/ \
\ / :..... : :. .: : :.....: :....: : \ /
\ / `:' \ /
\ / :. .: E M B R A C E ! \ /
\/__ _ `:' _ __\/



[介绍及截图摘自互联网,未经过安装测试,后果使用者自负]
共享服务时间:每天不定时
共享服务器:随机
软件版权归原作者及原软件公司所有,如果你喜欢,请购买正版软件!

正在读取……

这里是其它用户补充的资源(我也要补充):

暂无补充资源
正在加载,请稍等...

点击查看所有45网友评论

 

(?) [公告]留口水、评论相关规则 | [活动]每日签到 轻松领取电驴经验

    小贴士:
  1. 类似“顶”、“沙发”之类没有营养的文字,对勤劳贡献的楼主来说是令人沮丧的反馈信息。
  2. 提问之前请再仔细看一遍楼主的说明,或许是您遗漏了。
  3. 勿催片。请相信驴友们对分享是富有激情的,如果确有更新版本,您一定能搜索到。
  4. 请勿到处挖坑绊人、招贴广告。既占空间让人厌烦,又没人会搭理,于人于己都无利。
  5. 如果您发现自己的评论不见了,请参考以上4条。