BLACKLIGHT
BlackLight 可以快速分析電腦儲存區和移動設備。它揭示了用戶的行為,現在甚至包括對內存圖像的分析。BlackLight允許輕鬆搜索,過濾和篩選大型數據集。它可以在邏輯上獲得Android和iPhone / iPad設備,在Windows和Mac OS X上運行,並且可以在一個界面內分析來自所有四個主要平台的數據。它只是智能,全面分析的最佳選擇。
特色
ACTIONABLE INTEL
EASILY UNCOVER USER ACTIONS
BlackLight’s Actionable Intel view allows examiners to view various data points that can be attributed to a user's actions. Traces of potentially important user activity from many disparate locations are organized for practical, efficient examination. Elements include:
Windows Registry artifacts - recently executed files and programs, link files, jumplists, Prefetch and Superfetch data
Device connection data for all devices previously connected to the system, including USB device connection dates/times and the associated user account
iOS device backups
Recent file downloads
Trash (for Mac OS X volumes) and Recycle Bin (for Windows volumes)
Current and deleted user account info
MEMORY
ANALYZE WINDOWS MEMORY FILES
Analyzes several types of memory files, including raw dumps, Hibernation files (Windows Vista to Windows 10), pagefile.sys, and crash dumps (full, from Windows Vista or 7)
Performs file carving and bulk extraction content searches (for numerous items such as URLs, addresses, phone numbers, etc.)
Features a Memory subview for analyzing processes, libraries, sockets, handles, and drivers
Processes memory files many times faster than traditional open-source forensic tools
FILE FILTER VIEW
EFFICIENTLY SIFT THROUGH LARGE DATA SETS
BlackLight's signature File Filter view includes examiner-defined filter options to quickly pinpoint relevant data within large data sets. Filter criteria include:
File name, kind, size, or extension
Date created, modified, or accessed
Picture metadata attributes, including GPS coordinates and camera (iPhone/iPad device) type
Positive and negative hash set filtering
Examiners may apply any number of filters or inverse filters to quickly isolate important data from system files or base application files. BlackLight comes with several pre-set file filters, including those that filter by file type, file attribute, geolocation coordinates, and source device type.
MEDIA
FIND THE PICTURE AND VIDEO EVIDENCE YOU NEED
BlackLight's Media view has built-in support for all commonly used picture and video file types, and it includes several helpful and examiner-oriented analysis features, such as:
Built-in GPS Mapping:
All media files containing GPS data will be identified with a placemark badge
Examiners can view media geolocation data on a Mercator map (offline) or using Google Maps (online) directly from the built-in GPS view
Proprietary Skin Tone Analysis Algorithm:
Sort picture and video files by the skin tone percentag...
Cerbero Profiler 代表了一種新的安全和文件分析方法。它不是一種防病毒軟體,而是它創建一個掃描檔的設定檔, 通過此以確定威脅和隱私問題,並向使用者公開此設定檔以及警告和其他資訊。它主要用於安全和法醫分析。但是,它也可以用於中等和高級用戶:沒有經驗的用戶可能無法評估JavaScript代碼的風險,但系統管理員可以。這使得安全行業以外的公司也可以訪問該軟體。最重要的是,該產品提供了一個簡單的風險評估,以便即使是經驗不多的用戶也能從中受益。
Profiler的主要目的是分析文件中包含的零日漏洞的利用和私人信息。關鍵是與用戶進行交互,用戶可以詳細評估Profiler發現的任何問題,並對文件進行進一步檢查。另一個重要特徵是能夠分析嵌入或引用的文件,因為在許多情況下,安全問題可能不在最初掃描的文件中,而是包含在其中或引用的文件中(一個簡單的例子是JPEG公開了地理位置信息嵌入到PDF中)。一個或多個文件的分析可以保存到項目中,這些項目也可能包含文件本身的副本。
Support for all Windows editions (支持所有Windows版本)
Cloudflare 企業方案的優點與功能
Web 現況
在現今世界中,您的網站就是您的業務命脈。然而,網站維護與運作比以往更為複雜。Web 的高度開放性也是其弱點:攻擊者可以找到多個網路通訊層與各種通訊協定的弱點。犧牲效能來封鎖每個可能的受攻擊面並不是一個好主意。因此,您需要一個簡單、經濟且可跨電腦、行動裝置與網路運作的解決方案。
Cloudflare 讓您只需要簡單地變更 DNS,就能保護您的網站,並提高其執行速度與可用性。Cloudflare已重新思考網路、硬體與軟體層的整個技術堆疊,並在高可用性全球網路上建置反向 Proxy 服務。透過以雲端服務方式提供此功能,Cloudflare可協助您節省時間、金錢與精力。Cloudflare不斷創新,帶來的全新 Web 體驗,都將持續嘉惠於您,讓您的網站訪客在使用時更安全愉快。
功能一覽
超過 25 億個唯一 IP
550 萬個網站且持續增加中
每天處理數十億次網頁瀏覽要求的全球網路
廣泛的客戶群뼷包括主要消費者網站뼵政府機構與企業
Flat Bandwidth Pricing
With Cloudflare’s content delivery network, you’ll never be charged for bandwidth. This means predictable monthly bills, regardless of the amount of traffic served from our edge.
DeviceLock 能控管USB埠、Firewire、藍牙、紅外線等個人端電腦的周邊連接埠,以及可攜式磁碟(記憶卡、隨身碟)、光碟機,以及多種智慧型手機,同時能限制列印和擅自連至無線網路。不只限制員工電腦對周邊裝置的存取,以及持續記錄使用者的接取行為,更可以鎖定特定的使用者,透過部署在每臺電腦的代理程式,將他們所外存至周邊裝置的檔案資料複製下來,再上傳至伺服器上。
現今的員工可能在不知情下複製隱私或敏感的公司資料,經由存取智慧型手機、數位相機、PDA、DVD/ CDROM,或者其他可攜式硬碟洩漏數據。亦或者經由電子郵件、即時聊天室、Web、社群網站或telnet連線。另外,無線端點如Wi – Fi、藍牙、紅外線設備等途徑,提供更多數據丟失的渠道。這些網路安全的漏洞現在有了良好的解決方案,DeviceLock端點數據洩漏防護(DLP)將有效的防護您的資料外洩。
DeviceLock的DLP解決方案,提供給您最大的防止洩漏資料的功能。它的多層次的檢查和攔截引擎,可以全方位的控制數據洩露途徑。DeviceLock的內容分析和過濾器,可選擇要控制的數據交換端點、移動媒體、PnP設備以及網絡。 此外,DeviceLock安全管理員可以精確地分配用戶轉讓、接收和儲存公司電腦數據的權限。DeviceLock支援DLP管理方法,使安全管理員能使用Windows Active Directory GPO及DeviceLock控制台進行動態管理。經由DeviceLock你可以集中控制、記錄、複製(shadow)及分析用戶的數據傳輸資料。DeviceLock將使您的數位資料更有保障。
更新介紹
NetworkLock: Enhanced WhatsApp Desktop application support in Protocols.
NetworkLock: Enhanced ICQ instant messenger support in Protocols.
NetworkLock: Enhanced Zoom support in Protocols.
NetworkLock: Improved support for Facebook in the Social Networks control in Protocols.
NetworkLock: Enhanced Mail.ru in the Web Mails control in Protocols.
NetworkLock: Enhanced performance on terminal servers where MAPI protocol interception was activated.
ContentLock / Search Server: Enhanced processing of Microsoft Excel and Adobe PDF files with Japanese Kanji text.
DeviceLock: Added support for Windows 10 version 2004 (20H1).
DeviceLock: DeviceLock Enterprise Server’s Audit and Shadow log reports now correctly display Chinese strings.
DeviceLock: Fixed issue that caused DeviceLock Enterprise Server service deadlock in some specific environments.
DeviceLock: Fixed intermittent issue that caused delays of the data transfer of audit and shadow logs to the DeviceLock Enterprise Server.
.NET Reactor 是一個强大的.NET程式碼保護系統,可以完全停止任何反編譯。開發人員能够以安全和簡單的方式保護他們的軟體,而不必每天擔心要如何保護自己的知識產權。
Why you need to protect your intellectual property.
When you compile a program written for the Microsoft .NET framework, the program you provide to your users is not compiled into a native executable program, but instead is translated into something called the Common Intermediate Language instructions (CIL). CIL is half way between source code and native code, and is interpreted by the .NET framework when your program is run, rather than executed directly as machine code. Because of this, the source code of your application or library can be easily reproduced. Tools such as .NET Reflector (www.red-gate.com/products/reflector/) can reproduce source code from a compiled .NET assemblies in seconds, and in the .NET language of your choice! Clearly, commercial software distributed to end users without some form of protection is wide open to piracy and intellectual property theft.
The traditional solution to intellectual property protection in .NET is to use 'obfuscation', indeed Microsoft make an obfuscation utility available to Visual Studio users.
So why is obsfucation not enough?
Obfuscation is the process of making your source code more difficult (but not impossible) for humans to understand. Obfuscation works by replacing the meaningful names you assign to classes, methods, properties and variables with meaningless ones. For example, it may replace a variable name of "counter" with "A4DF3CV89G" - to humans these obfuscated names are confusing and difficult to remember, but have no effect on the NET Framework interpreter. Note that obfuscation does nothing to the source code within your methods, so it is not protected at all by obfuscation. .NET Reactor does everything an obfuscator does, but then wraps your intellectual property in several more layers of protection, denying access to your source code to even those who are determined to steal your hard work. .NET Reactor's protection has never been cracked, something which cannot be said about obfuscators.
Industry Leading .NET Reactor Source Protection
.NET Reactor prevents decompilation by a variety of methods which convert your .NET assemblies into processes which no existing tool can decompile ( and which are also very likely to prevent decompilation by any future tool). .NET Reactor builds a native code wall between potential hackers and your .NET assemblies by producing a file which cannot be understood directly as CIL. Because the CIL in your assembly is emitted intact only at run time or design time (in a form in which the source is completely inaccessible), no tool is capable of decompiling .NET Reactor protected assemblies.
The native code wall created by .NET Reactor between the hacker and your source includes industry leading NecroBit technology, which is exclusive to ....
FreeMeter 是一個相當好用的系統監測工具,可檢測磁碟、CPU、內存的使用情況,網路流量,磁碟傳輸速率,Freemeter 全面支援UNC,所以可以檢測網路磁碟。它可以為您做好最佳的系統監控動作,相當方便。新版本還增加了一個電子郵件插件,您可以通過它來收發郵件。
FreeMeter 提供了相當個人化及豐富的系統監測功能,讓使用者可以快速的了解系統的使用狀況,對於系統遭遇問題時的狀況排除,算是一個不錯的輔助工具。
我們可以用它來監看系統的運作狀況,讓我們可以快速概括的排除系統所遭遇到的問題。FreeMeter 所能監測的項目包括了我們目前正在使用的儲存週邊使用狀況、CPU 使用率、NT 分頁檔、碟碟資料傳輸速度以及記憶體使用狀況等,非常的方便。
FreeMeter 具有相當個人化的操作介面,每個監測項目都有其各自的喜好設定,而且使用者還可以自行決定監測視窗的排列位置、是否隱藏或是否顯示小圖於系統列中。
而在 Driver Space 的監視框中,使用者還可以把抽取式裝置加入監視畫面,而且它也具備了非常方便的目錄使用 (Folder Usage) 資訊的顯示功能,讓我們可以快速的了解磁碟較細部的使用狀況。
FreeMeter 和 FreeMeter Pro 相比是少了網路監控及更個人化設定的功能,如果使用者有需要利用到更多的系統監控功能,則可以考慮購買FreeMeter Pro。
系統需求
Operating Systems - Runs on Windows 7, 8, 10 and Windows Server 2008 and later. Supports both 32-bit and 64-bit operating systems. Works with all language versions.