Veeam® Endpoint Backup FREE provides a simple solution for backing up Windows-based desktops and laptops. With Veeam Endpoint Backup FREE, you can easily back up your PC to an external hard drive, NAS (network-attached storage) share or a Veeam Backup & Replication repository.
Tuesday, June 2, 2015
Acrylic WiFi is a free WiFi scanner that displays WiFi access points and connected devices, shows information of the security mechanisms and obtains generic WiFi passwords thanks to a plugins system. The utility is able to gather information from 802.11/a/b/g/n/ac networks.
Monday, June 1, 2015
This Fling enables you to perform a what-if analysis for host failures on your infrastructure. You can simulate failure of one or more hosts from a cluster (in vSphere) and identify how many:
- VMs would be safely restarted on different hosts
- VMs would fail to be restarted on different hosts
- VMs would experience performance degradation after restarted on a different host
With this information, you can better plan the placement and configuration of your infrastructure to reduce downtime of your VMs/Services in case of host failures.
Porteus is a complete Linux operating system that is optimized to run from CD, USB flash drive, hard drive, or other bootable storage media. A "Kiosk" edition is available for web-only terminals with Firefox as the sole application.
This freeware can be used in Windows 2000 professional, XP, Vista, Windows 7 and Windows 8. Both 32-bit and 64-bit editions of Windows are supported.
It supports FAT, FAT32 and NTFS file systems. IDE, SATA, eSATA, SCSI, SSD, USB external hard disk, USB flash drive, etc, are supported.
The Network Obfuscation and Virtualized Anti-Reconnaissance (Nova) system is an open-source software tool developed to detect network based reconnaissance efforts, to deny the attacker access to real network data while providing false information regarding the number and types of systems connected to the network.
In any intrusion, the attacker must first perform reconnaissance to learn all about a network by discovering information such as how many systems are online, what operating systems are installed on them, what services are running on those machines, and what ports may be open. Each piece of information gained is one step closer to a successful attack.
Nova prevents and detects this snooping by setting up a large net of realistic virtualized decoys. Trying to find the real machines then becomes like trying to find a needle in a haystack. Meanwhile, Nova identifies the attackers by their inevitable suspicious activity in communicating with decoys. It provides the network administrators a Situation Awareness view of their network.