Hello BTS readers, we have update our File Integrity verifying tool “Hash Code Verifier”. The new version 1.1 is available to download. Changelog:———————– recursive directory traversal: Generate hash for all files in the given folder Clear Table Bug fixed Singl File comparing issue Fixed Right-Click copy menu null file creation fixed Hide/Show Columns options User […]
Category: Security Tools
Download Hash Code Verifier v1.0 : A tool to verify the File Integrity
Hello BTS Readers,we are happy to announce that we have released our second security tool ‘Hash Code Verifier’. Hash Code Verifier is a Cross-platform application to verify the Integrity of your download files. Hash Code verifier can be very useful if you want to check if a downloaded file is original and not corrupted or […]
Introduction to Web Application Firewall (WAF) ~ Website Security
What is WAF?WAF is expanded as Web Application Firewall. WAF is server side application that controls the input and output(filter the HTTP communication). It controls network traffic on any OSI Layer up to Application Layer. The main purpose of WAF is to provide better protection over the top Wep Application vulnerability such as XSS(Cross Site Scripting), SQL […]
How to Disable Social Networks from tracking you ? ~Privacy Tips
I hope you read the Facebook privacy risk news. Did you know that social networking sites like Facebook, Google+, and Twitter can track your visits to any web page that uses the familiar “Like”, “Follow”, or “+1” buttons, even if you do not actually click these buttons? Here i am going to introduce a new […]
TrueCrypt ~ Protect your files/folders with Encrypted Passwords
Do you store your accounts id ,password or any other confidential info in plain text? If you say yes, You must read this article. Risks of Storing confidential data in Plain Text: Your friends or any other who has access to your pc are able to view your confidential data. Because it is in simple […]
INSECT Pro 2.7 ~ Penetration security auditing and testing Tool
INSECT Pro 2.7 – This penetration security auditing and testing software solution is designed to allow organizations of all sizes mitigate, monitor and manage the latest security threats vulnerabilities and implement active security policies by performing penetration tests across their infrastructure and applications. INSECT can help to build a strong security posture that is easy […]
ERPScan WEBXML Checker- Security Testing for SAP J2EE applications
ERPScan WEBXML checker is a freeware tool that is intended for checking security configuration of SAP J2EE applications by scanning a WEB.XML file . It is intended to checking WEB.XML files for different vulnerabilities and missconfigurations like Verb Tampering, Invoker servlet bypass and other missconfigurations. Detailed information about that vulnerabilities can be found in whitepaper […]
Snort v 2.9.1~Network intrusion prevention and detection system (IDS/IPS)
SnortĀ® is an open source network intrusion prevention and detection system (IDS/IPS) developed by Sourcefire. Combining the benefits of signature, protocol, and anomaly-based inspection, Snort is the most widely deployed IDS/IPS technology worldwide. With millions of downloads and nearly 400,000 registered users, Snort has become the de facto standard for IPS. It is capable of […]
WebSurgery v6.0 ~security testing for web applications
WebSurgery is a suite of tools for security testing of web applications. It was designed for security auditors to help them with the web application planning and exploitation. Currently, it uses an efficient, fast and stable Web Crawler, File/Dir Brute forcer, Fuzzer for advanced exploitation of known and unusual vulnerabilities such as SQL Injections, Cross […]
What is Aircrack-ng? WEP and WPA-PSK Cracking Tool
What is Aircrack-ng? Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack, thus making the attack much faster compared to other WEP cracking […]