Search N5 Net Software Repository:
Search Files
Sponsor:
Browse:
- Audio & Multimedia (1643)
- Business (3971)
- Communications (1197)
- Desktop (222)
- Development (607)
- Education (291)
- Games & Entertainment (731)
- Graphic Apps (698)
- Home & Hobby (108)
- Network & Internet (593)
- Security & Privacy (536)
- Servers (69)
- System Utilities (31267)
- Web Development (297)
Areas Of Interest
Authors Area
Are you a software author? Take a look at our Author Resource Center where you will find marketing tools, software specifically created for promoting your software and a ton of other helpful resources.
Ace Password Sniffer 1.4
New version provides candidates of username or password for HTTP post submission. The most powerful and effetive password sniffer. Ace Password Sniffer can listen on your LAN and enable network administrators or parents to capture passwords of any network user. Currently Ace Password Sniffer can monitor and capture passwords through FTP, POP3, HTTP, SMTP, Telnet, and etc. Ace Password Sniffer works passively and don't generate any network traffic, therefore, it is very hard to be detected by others. And you needn't install any additional software on other PCs or workstations. If your network is connected through switch, you can run the sniffer on the gateway or proxy server, which can get all network traffic. This stealth-monitoring utility is useful to recover your network passwords, to receive network passwords of children for parents, and to monitor passwords abuse for server administrators. Features: * Efficient You can see the passwords as soon as it appeared on LAN. * Support Various Protocols Fully support application protocols of FTP, SMTP, POP3, TELNET, etc. That means user names and passwords used to send and receive emails, to log on a web site, or to log on a server, can all be captured and saved. * Support HTTP Protocol Support HTTP protocol, including proxy password, basic http authenticate authoriation and most passwords submitted through HTML, no matter they are encoded by MIME or base64. * Verify whether the captured passwords are valid It can tell whether the passwords are right. You can even get the replies from the server for the login. And it always keeps trying to get valid user name and password pairs.
Specifications:
Version: 1.4 |
Download
|
Similar Products:
LASTBIT POWERPOINT PASSWORD RECOVERY 12.0.9123
Security & Privacy :: Other
Password recovery tool for password-protected PowerPoint presentations. PowerPoint password protection is based on strong crypto algorithms, so password recovery is a complex task. PowerPoint Password uses various password recovery methods: Plain Dictionary and Hybrid Dictionary attacks, Brute-Force attacks, and Smart-Force (TM) attacks.
Windows | Demo
Read More
Security & Privacy :: Other
Privacy Eraser is an all-in-one privacy suite, PC optimization and cleaning tool. It cleans all of your internet history traces and past activities with one click, recovers hard drive space by deleting unnecessary and redundant files, speeds up internet surfing and browsing, boosts your PC's performance and stability making it faster, secure and more efficient.
Windows | Freeware
Read More
Security & Privacy :: Other
Privacy Eraser is an all-in-one privacy suite, PC optimization and cleaning tool. It cleans all of your internet history traces and past activities with one click, recovers hard drive space by deleting unnecessary and redundant files, speeds up internet surfing and browsing, boosts your PC's performance and stability making it faster, secure and more efficient.
Windows | Freeware
Read More
Security & Privacy :: Other
File Monster completely erases files from your system -- actually overwriting the information in the file so it can not be recovered. The reason information is still available when you delete files with normal deletion methods is because normal deletion methods only tell the operating system to not recognize the file as being present anymore, yet the information hasn't really been erased.
Windows | Shareware
Read More