Menu
Submit Site
Home
Computer
Security
All sites of Security
Unatek Intrusion Detection and Prevention
Unatek Intrusion Detection and Prevention- Providing information on the corporate intrusion and detection products, services and consulting. ...
Mirage Networks - Network Access Control
Mirage Networks - Network Access Control- Complete control over the endpoint devices on your network, combining agentless Network Access Control (NAC) with day-zero threat prevention and automated policy enforcement. ...
Support Intelligence
Support Intelligence- REACT is a network abuse monitoring and tracking service which provides real time data to track and control abusive hosts on your network. ...
Cisco: Intrusion Prevention System
Cisco: Intrusion Prevention System- Network and host based IPS systems designed to detect, classify and stop threats. Includes technical information on solution components and support pages. ...
BotHunter
BotHunter- Network monitoring tool recognizes the activity patterns of infected computers. Available for Unix (including Linux and OS X) and Windows XP, and as a standalone LiveCD. ...
Industrial Defender
Industrial Defender- A multi-layered security system designed to protect mission-critical control systems and assist compliance with industry regulations. Incorporates NIDS, HIDS, perimeter security, virus protection, pe ...
COAST Intrusion Detection Pages
COAST Intrusion Detection Pages- Perdue University's clearinghouse for intrusion detection information. Includes overviews, policy, detection methods, and tools. ...
Recent Advances in Intrusion Detection
Recent Advances in Intrusion Detection- The RAID workshop series is an annual event dedicated to the sharing of information related to the intrusion-detection area. ...
Intrusion Detection in Columbia University
Intrusion Detection in Columbia University- This project is a data-mining based approach to detecting intruders in computer systems. The project approaches the intrusion detection problem from a data-mining perspective. ...
Cost-sensitive intrusion detection(Georgia Institute of Technology)
Cost-sensitive intrusion detection(Georgia Institute of Technology)- A Data Mining Approach for Building Cost-sensitive and Light Intrusion Detection Models ...
Intrusion detection projects at UC Davis
Intrusion detection projects at UC Davis- Anomaly Detection in Database Systems, Common Intrusion Detection Framework, Intrusion Detection and Isolation Protocol / IDIP, Intrusion Detection for Large Networks, Misuse Det ...
Intrusion Detection Research Group(NCSU)
Intrusion Detection Research Group(NCSU)- The Intrusion Detection (ID) Research Group at NC State University was formed by Dr. Peng Ning in August 2002. ...
Intrusion Detection User Group
Intrusion Detection User Group- A group mailing focusing on security information management, intrusion response, intrusion detection, intrusion prevention, intrusion management and honeynets/honeypots. ...
Thor
Thor- Research project that utilizes network attack variations to make more precise statements about the detection capabilities of an IDS. ...
Recent Advances in Intrusion Detection Symposium 2004
Recent Advances in Intrusion Detection Symposium 2004- International Symposium on Recent Advances in Intrusion Detection. Held in conjunction with ESORICS 2004, September 15-17, 2004. The RAID International Symposium ser ...
Intrusion Detection Analysis: A Case Study
Intrusion Detection Analysis: A Case Study- A case study/research paper providing detailed analysis of several anomalous network events to illustrate the techniques for examining alerts and logs generated by a network in ...
Minnesota Intrusion Detection System (MINDS)
Minnesota Intrusion Detection System (MINDS)- Research project focused on the development of high-performance data mining algorithms and tools that will provide support required to analyze the massive data sets generated ...
What-is-exe Process Database
What-is-exe Process Database- Directory of computer processes, including those associated with spyware applications. ...
Common Intrusion Detection Framework (CIDF)
Common Intrusion Detection Framework (CIDF)- Aims to develop protocols and application programming interfaces so that intrusion detection research projects can share information and resources and so that intrusion detect ...
The Center for Secure and Dependable Software(University of Idaho)
The Center for Secure and Dependable Software(University of Idaho)- Hummer is a distributed component for any Intrusion Detection System ; Magpie is a hierarchical network of lightweight, mobile, and adaptive tools desig ...
F-Secure
F-Secure- Anti-virus and anti-intrusion software designed for both home and corporate users. ...
Sophos Ltd.
Sophos Ltd.- Full line of network, endpoint and server data security solutions designed for business users with worldwide channel and technology partners. ...
Loaris
Loaris- Malicious computer software removal program. ...
EScan
EScan- Security solution provider specializing in antivirus, antispam, content security and network intrusion prevention solutions. ...
SurfRight
SurfRight- Provider of HitmanPro - a software designed to detect and remove spyware and malware. ...
Trend Micro
Trend Micro- Trend Micro offers free tools that actively protect you from Web threats. Scan your computer to find settings changed by spyware, malware or other unwanted programs. ...
The No More Ransom Project
The No More Ransom Project- Free decryption tools for some ransomware variants and advice on how to stay safe. ...
LiUtilities Windows Process Library
LiUtilities Windows Process Library- Listing of processes commonly found on Windows systems, and their purpose. Includes a large directory of malicious processes with basic descriptions. ...
Spyware Warrior: Rogue/Suspect Anti-Spyware Products & Web Sites
Spyware Warrior: Rogue/Suspect Anti-Spyware Products & Web Sites- Products found to not provide proven, reliable anti-spyware protection or found to use unfair, deceptive, high pressure sales tactics and false positives ...
StopBadware.org
StopBadware.org- Project being run by Harvard Law School, Oxford University and Consumer Reports WebWatch to develop a clearinghouse for research on badware and those who create and spread it. Includes forms for reportin ...
SANS Institute - Malware FAQ
SANS Institute - Malware FAQ- Grouped by kind of malware: worms, exploit code and trojan horses. ...
Malwarebytes
Malwarebytes- Service offering removal tools and prevention advice. ...
CEXX Org - Counterexploitation
CEXX Org - Counterexploitation- Detailed descriptions of various spyware, adware, and other parasitic software. Includes instructions for removing many common and not-so-common spyware and adware programs. ...
Doxdesk
Doxdesk- Information on how to prevent infection, lists of reputable and rogue products, database of known parasites and glossary of terms. ...
TeMerc Internet Countermeasures
TeMerc Internet Countermeasures- Information on preventative measures, details of the malware community good guys and bad guys, and of specific spyware threats. Includes help forums. ...
Spyware Removal
Spyware Removal- Information and resources regarding spyware and how to remove it. Get up-to-date information and removal instructions regarding the latest spyware and adware threats. ...
SecurityFocus
SecurityFocus- Article about spyware keyloggers, how they work, how to remove them and prevention of keystroke capture. ...
Spyware Warrior
Spyware Warrior- Blog of spyware news developments, testing results for anti-spyware products, details of rogue products and forums providing advice and support for people with spyware infections. ...
Ben Edelman
Ben Edelman- Doctoral student involved in spyware related research and investigations into associated unethical practices. Includes research papers, news, biography and presentations given. ...
ProcessLibrary
ProcessLibrary- Windows processes listed by name; a resource for determining whether a particular process is necessary, superfluous or even harmful. ...
Malware Help.org
Malware Help.org- News article database featuring articles submitted by users about malicious software threats. ...
AIM: Getting More than You Bargained For
AIM: Getting More than You Bargained For- eSecurityPlanet columnist Ray Everett-Church says AOL's Instant Messenger software gives him more than he bargained for. ...
Wikipedia - Spyware
Wikipedia - Spyware- A very detailed look at what spyware is, how it attaches itself to computers, and the common methods of prevention. ...
Spyware's Most Wanted
Spyware's Most Wanted- Instructions for beginners on how to install and use the most common paid and free anti-spyware products. ...
Vitalsecurity.org
Vitalsecurity.org- A blog concerning spyware, malware, and mistakes that several of the big computer companies make. ...
It Pays To Read License Agreements
It Pays To Read License Agreements- Explains that if a person gets spyware and adware on his or her computer, it could be because he or she agreed to it. ...
Trend Labs Anti-Malware Blog
Trend Labs Anti-Malware Blog- A blog published by Trend Micro reporting on recent malware outbreaks and discovered software exploits. ...
Check Processes
Check Processes- Online application that scans screenshots of the Windows Task Manager and analyzes listed processes for possible infections. ...
Spyware Sucks
Spyware Sucks- News and analysis of emergent malware threats. ...
Malware Domain List
Malware Domain List- Featuring a list of malware-related sites plus a discussion forum on new threats. ...
« First
Previous
Page 17 of 42.
Next
Last »
Latest sites from Security
HoneyDrive Desktop
SecureLab
Security Focus
CERT Coordination Center
CR80 News
Heimdal
CyberEvidence, Inc.
JurInnov Ltd.
G-C Partners
Secure Crossing
Privacy Scan
Red Iron
Degausser.co.uk
TSFactory
Nmap
Avatier Corporation
Yoggie Security Systems
Nsauditor.com
Inguama
Sybari Software, Inc.
Declude Virus
Avira
CAcert
Checkpoint
InfoExpress
Send feedback
submit