
TRICK Free to use

eTuP is a utility that permits point-to-point encryption in networks. It consists of two agents (one in the source (local) network, one at the destination (remote) device) that forward all Ethernet traffic from one place to another, over a tunneling protocol. The tunnel can be encrypted on-demand, thus securing all connections between the remote device and the network.
A vulnerability assessment tool for personal computers and servers running the Windows operating system. After installation of a light software client on machines spread over the monitored network, Software Checker informs the user of the installed software, key elements of the configuration, potential vulnerability of the software according to vulnerability databases such as OSVDB and the latest version of trusted software. (more…)