Software DownloadsApplication Security Inc Software

Shareware and Freeware Software Downloads:

Application Security Inc

Show: All Free

Light Application Security for MS Access 3.0

LASsie (Light Application Security) is a library of Microsoft Access objects that you can reference from, or add into your MS Access application to implement basic form level security. With LASsie, you can prevent a user from opening specific forms/reports, or restrict a userls ability to update data on a form.

11-Feb-2009
1.4 MB
Shareware
Download
More Info

Ascella Log Monitor 1.0

Allows users to monitor events recorded in the Application, Security, System logs, dispatches the notifications about events via LAN, which can be received by the Windows NT4/2000 Messenger service, and using e-mail, SMS and ICQ (via e-mail gates)

06-Aug-2010
716.8 KB
Freeware
Download
More Info

Ascella Log Monitor Plus 1.4.1

Allows users to monitor events recorded in the Application, Security, System logs, dispatches the notifications about events via LAN, which can be received by the Windows NT4/2000 Messenger service, and using e-mail, SMS and ICQ (via e-mail gates). Works as Windows service.

05-Aug-2010
809.0 KB
Shareware
Screenshot
Download
More Info

Event Log Janitor 1.0

Event Log Janitor Emails Event Logs at predefined Intervals (in hours) that you specify and you can optionally clear them. Supported logs: APPLICATION, SECURITY, SYSTEM, DIRECTORY SERVICE, FILE REPLICATION SERVICE, and DNS Server. Simple to use, requires no SMTP Server setup - specify DNS Server, email address(es), hour interval to email, and whether or not to clear the log in the easy portable dialog configuration. Requires the MS.NET Framework.

06-Aug-2010
1024.0 KB
Shareware
Download
More Info

Interactive TCP Relay 1.0

This application security test tool gives developers an environment for testing non-HTTP Client/Server applications, similar to that provided by interactive HTTP proxies. When started, ITR operates as a simple TCP tunnel, listening on a specific port, and forwarding all the traffic to the remote host and port. By configuring the client to treat the ITR as its server, all traffic between a client and a server can be tunneled and logged. The...

08-May-2009
177.0 KB
Freeware
Download
More Info

LASsie for MS Access 4.6

LASsie (Light Application Security) is a Microsoft Access Add-In that enhances your Access application with a simplified user security system. Intended as an alternative to Access? built-in security, LASsie offers a less complicated way to secure forms, reports, controls and certain records from unauthorized user access. With LASsie, you can prevent a user from opening specific forms/reports, restrict their ability to update data on a form,...

11-Feb-2009
1.4 MB
Shareware
Download
More Info

Acunetix Web Vulnerability Scanner FREE 6.0

Audit your website security with Acunetix Web Vulnerability Scanner As many as 70% of web sites have vulnerabilities that could lead to the theft of sensitive corporate data such as credit card information and customer lists. Hackers are concentrating their efforts on web-based applications - shopping carts, forms, login pages, dynamic content, etc. Accessible 24/7 from anywhere in the world, insecure web applications provide easy access to...

05-Nov-2012
13.1 MB
Freeware
Screenshot
Download
More Info

Event Log Explorer 4.5

Event log analysis of Windows event logs is a vital task for any system administrator. The standard Windows Event Log Viewer has limited facilities, and doesn't allow you to perform effective event log analysis. Event Log Explorer is a simple but powerful utility for monitoring, viewing and analyzing events in the Security, System, Application and other Microsoft Windows logs. It extends standard Event Viewer functionality and brings a lot of...

04-Aug-2015
4.7 MB
Shareware
Screenshot
Download
More Info

Maui Security Scanner 2.51.10

Maui is a automated next-generation web application vulnerability scanner. Able to quickly scan and analyze large complex web sites/applications, Maui identifies application vulnerabilities ( e.g. Cross Site Scripting (XSS), SQL injection, Code Inclusion etc.. ) as well as site exposure risk, ranks threat priority, produces highly graphical, intuitive HTML reports, and indicates site security posture by vulnerabilities and threat exposure....

26-May-2007
8.4 MB
Shareware
Screenshot
Download
More Info

ThreatSentry - Web Application Firewall 4.1.24.0

PrivacywareOCOs award-winning IIS Web Application Firewall and Host Intrusion Prevention solution, ThreatSentry, stops a wide range of web application threats and helps IT departments certify compliance with PCI DSS. ThreatSentry delivers protection from SQL Injection, Directory Traversal, Cross-site scripting, CSRF, Parameter Manipulation, Buffer Overflow, and Denial of Service attacks and helps customers comply with Section 6.6 of the...

26-Feb-2013
10.1 MB
Commercial
Screenshot
Download
More Info

BT Guard 1.0

Do you use Bluetooth on your mobile? Then BT Guard application is what you need: it secures your Bluetooth and turns it off automatically. From now on you will not forget the open Bluetooth connection and your mobile will be safe from BT attacks and intrusions. BT Guard is security application for your mobile phone that guards your Bluetooth connection. You define after which time of being on, your Bluetooth should be set to Off or...

22-Dec-2007
295.5 KB
Shareware
Screenshot
Download
More Info

Acunetix Web Vulnerability Scanner 4.0

Audit your website security with Acunetix Web Vulnerability Scanner Hackers are concentrating their efforts on attacking applications in your website: 75% of cyber attacks are launched on shopping carts, forms, login pages, dynamic content etc. Web applications are accessible 24 hours a day, 7 days a week and control sensitive data such as customer details, credit card numbers and proprietary corporate data. Firewalls, SSL and...

09-Aug-2006
8.0 MB
Shareware
Download
More Info

PC Network EventLog Scanner 2.15.56.110

PC Network EventLog Scanner is a program that allows you to scan your network computers for all types of eventlogs added, including eventlog data from 'application', 'security', ' system' and other custom added eventlog criteria available in Microsoft Windows.

28-Dec-2012
3.8 MB
Shareware
Screenshot
Download
More Info

IISWall Firewall Domain name Professiona 2.2

Professional Web Application Firewall for IIS. Manage, Protect and Active-Defend your IIS Server perfectly. Features: Anti-SQLFlood DDoS Attack. Prevent SQL injection, cross Site scripting, directory traversal, evil encode and other webhacker intrusions. Enable or Disable proxy server access. Hotlinking prevention of pictures, downloading files and media files. Anti-StealLink develop kits, supporting any web system and any user database....

18-May-2013
649.0 KB
Shareware
Screenshot
Download
More Info

IISWall Firewall Domain name standard 2.2

Professional Web Application Firewall for IIS. Manage, Protect and Active-Defend your IIS Server perfectly. Features: Anti-SQLFlood DDoS Attack. Prevent SQL injection, cross Site scripting, directory traversal, evil encode and other webhacker intrusions. Enable or Disable proxy server access. Hotlinking prevention of pictures, downloading files and media files. Anti-StealLink develop kits, supporting any web system and any user database....

09-Jul-2013
649.0 KB
Shareware
Screenshot
Download
More Info

IISWall Firewall IP Professional 2.2

Professional Web Application Firewall for IIS. Manage, Protect and Active-Defend your IIS Server perfectly. Features: Anti-SQLFlood DDoS Attack. Prevent SQL injection, cross Site scripting, directory traversal, evil encode and other webhacker intrusions. Enable or Disable proxy server access. Hotlinking prevention of pictures, downloading files and media files. Anti-StealLink develop kits, supporting any web system and any user database....

24-Feb-2013
649.0 KB
Shareware
Screenshot
Download
More Info

IISWall Firewall IP standard 2.2

Professional Web Application Firewall for IIS. Manage, Protect and Active-Defend your IIS Server perfectly. Features: Anti-SQLFlood DDoS Attack. Prevent SQL injection, cross Site scripting, directory traversal, evil encode and other webhacker intrusions. Enable or Disable proxy server access. Hotlinking prevention of pictures, downloading files and media files. Anti-StealLink develop kits, supporting any web system and any user database....

26-Mar-2013
649.0 KB
Shareware
Screenshot
Download
More Info

Windows 7 Firewall Control Plus Portable 3.5.1.131

Windows 7 Firewall Control Plus Portable is a useful program that allows you to control personal information leakage via controlling application network traffic. Manages and synchronizes port forwarding provided by external network connection (firewall/router) box with applications requirements and activity. Features: TE Decreases expenses of mobile/satellite connections TE Zone based network permissions management TE Integration with Window...

20-Feb-2013
1024.0 KB
Demo
Download
More Info

Web Resource 2.5

Resource Management and Scheduling Software. Eliminate your Spreadsheets Today! Simple, high-level resource and project scheduling with project and resource forecasting and flexible calendar views. With Web Resource, you can add unlimited resources, allocate these resources to projects and tasks, then view the results either on screen or in printed reports. The bi-directional integration with Replicon's other product, Web TimeSheet saves...

06-Aug-2010
7.1 MB
Shareware
Download
More Info

techFAQ360 SCWCD5.0 Simulator Success Kit 1.1

.Topics covered Servlet
Servlet Basic ,The Servlet Technology Model Set-1
The Structure and Deployment of Web Applications Set-2
Request Dispatcher Set-3
Session Management Set-4
Servlet Filter Set-5
Listner/Events in Servlet Set-6
Web Application Security Set-7
JSP
JSP Basic,The JavaServer Pages (JSP) Technology Model Set-8
JSP Actions ,Building JSP Pages Using Standard Actions Set-9
JSP Pages Using the...

24-Oct-2012
18.6 MB
Freeware
Screenshot
Download
More Info