📄 apd.htm
字号:
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<TITLE>Maximum Security -- Appendix D -- What's on the CD-ROM</TITLE>
</HEAD>
<BODY TEXT="#000000" BGCOLOR="#FFFFFF">
<CENTER>
<H1><IMG SRC="../button/samsnet.gif" WIDTH="171" HEIGHT="66" ALIGN="BOTTOM" BORDER="0"><BR>
<FONT COLOR="#000077">Maximum Security: </FONT></H1>
</CENTER>
<CENTER>
<H2><FONT COLOR="#000077">A Hacker's Guide to Protecting Your Internet Site and Network</FONT></H2>
</CENTER>
<CENTER>
<P><A HREF="../apc/apc.htm"><IMG SRC="../button/previous.gif" WIDTH="128" HEIGHT="28"
ALIGN="BOTTOM" ALT="Previous chapter" BORDER="0"></A><A HREF="../index.htm"><IMG
SRC="../button/contents.gif" WIDTH="128" HEIGHT="28" ALIGN="BOTTOM" ALT="Contents"
BORDER="0"></A>
<HR>
</CENTER>
<CENTER>
<H1><FONT COLOR="#000077">D</FONT></H1>
</CENTER>
<CENTER>
<H1><FONT COLOR="#000077">What's on the CD-ROM</FONT></H1>
</CENTER>
<P>On the <I>Maximum Security </I>CD-ROM, you will find some of the sample files
that have been presented in this book along with a wealth of other applications and
utilities.
<BLOCKQUOTE>
<P>
<HR>
<FONT COLOR="#000077"><B>NOTE:</B></FONT><B> </B>Refer to the <TT>readme</TT> file
on the CD-ROM for the latest listing of software. Also, in the <TT>readme</TT> file,
you will find instructions on how to install one or more HTML presentations. In particular,
there is an HTML presentation that will link you to most Web sites mentioned throughout
this book.
<HR>
</BLOCKQUOTE>
<H2><FONT COLOR="#000077"><B>Windows Software</B></FONT></H2>
<P>The following network utilities for Windows are on the CD-ROM. This listing provides
contact information for each company and a description of its product.
<H3><FONT COLOR="#000077"><B>DataGuard 1.3 Demo Release</B></FONT></H3>
<P>DataGuard allows secure and rapid enciphering of files and directories. Data encrypted
in this way can be sent using standard e-mail programs via public networks (such
as the Internet); secure data transmission is guaranteed. The use of efficient, optimized
algorithms reduces high performance losses in the system due to the encryption and
decryption process without endangering security. Requires Windows 95 or NT 4.0.</P>
<P>Secure Link Services AG</P>
<P>Ruchstuckstrasse 6, 8306 Brüttisellen, Switzerland</P>
<P>Voice: +41 1 805 53 53</P>
<P>Fax: +41 1 805 53 10</P>
<P>E-mail: <A HREF="mailto:info@sls.net"><TT>info@sls.net</TT></A></P>
<P>URL: <A HREF="http://www.sls.net/"><TT>http://www.sls.net/</TT></A>, <A HREF="http://www.sls.ns.ca/dataguard/dataguard.html"><TT>http://www.sls.ns.ca/dataguard/dataguard.html</TT></A>
<H3><FONT COLOR="#000077"><B>File Lock Series</B></FONT></H3>
<P>File Lock 95 Lite uses the Standard or Enhanced encryption method to protect any
information that is for your eyes only, such as a personal diary or finance information.</P>
<P>File Lock 95 Standard includes two additional encryption methods: the RUBY and
the Diamond. This is ideal for business-related information protection.</P>
<P>File Lock Wizard for Windows 95 is the easiest of the File Lock series. It comes
complete with three encryption algorithms with four compression algorithms. It is
the best in data protection for the home PC user.</P>
<P>These products require Windows 95 or NT and are fully functional trial versions
with a limited number of days.</P>
<P>D & L Computing</P>
<P>P.O. Box 6141</P>
<P>Huntsville, AL, 35824</P>
<P>Voice: 205-772-3765</P>
<P>Fax: 205-772-8119</P>
<P>E-mail: <A HREF="mailto:DLComputing@Juno.com"><TT>DLComputing@Juno.com</TT></A>,
<A HREF="mailto:DLCSales@Juno.Com"><TT>DLCSales@Juno.Com</TT></A></P>
<P>URL: <A HREF="http://www.dlcomputing.com/"><TT>http://www.dlcomputing.com/</TT></A>
<H3><FONT COLOR="#000077"><B>SAFEsuite</B></FONT></H3>
<P>SAFEsuite<FONT SIZE="1"><SUP>TM</SUP></FONT> is a family of network security assessment
tools designed to audit, monitor, and correct all aspects of network security. Internet
Scanner is the fastest, most comprehensive, proactive UNIX and Windows NT security
scanner available. It configures easily, scans quickly, and produces comprehensive
reports. Internet Scanner probes a network environment for selected security vulnerabilities,
simulating the techniques of a determined intruder. Depending on the reporting options
selected, Internet Scanner provides information about each vulnerability found: location,
in-depth description, and suggested corrective actions. (Requires Windows NT.)</P>
<P>Internet Security Systems, Inc. (ISS)</P>
<P>41 Perimeter Center East, Suite 660</P>
<P>Atlanta, GA, 30071</P>
<P>Voice: 770-395-0150</P>
<P>Fax: 770-395-1972</P>
<P>E-mail: <A HREF="mailto:info@iss.net"><TT>info@iss.net</TT></A></P>
<P>URL: <A HREF="http://www.iss.net"><TT>http://www.iss.net</TT></A>
<H3><FONT COLOR="#000077"><B>EtherBoy (Of the NetMan Suite)</B></FONT></H3>
<P>EtherBoy gives you affordable real-time multiprotocol network monitoring on your
IBM- compatible PC. It provides insights and answers to a large number of network
management and usage questions. Because EtherBoy is totally passive, no additional
load is placed on your network resources. It is an ideal addition to your desktop-based
management station, or as a laptop-based portable network probe. A unique tool that
combines many security techniques into a single package, EtherBoy can:
<UL>
<LI>View all traffic on your LAN.<BR>
<BR>
<LI>Identify all devices on your LAN, including potential security threats.<BR>
<BR>
<LI>Fully configure protocol focusing and visualization.<BR>
<BR>
<LI>Define custom protocols.<BR>
<BR>
<LI>Zoom in on areas of interest.<BR>
<BR>
<LI>Produce reports in text, HTML, data, or rich text format.<BR>
<BR>
<LI>Display real-time traffic statistics.<BR>
<BR>
<LI>Monitor individual hosts and links.<BR>
<BR>
<LI>Customize alarm triggers.<BR>
<BR>
<LI>Obtain full protocol summaries for each link.
</UL>
<P>EtherBoy will work on both the Microsoft Windows and Microsoft Windows 95 platforms.</P>
<P>NDG Software</P>
<P>P.O. Box 1424</P>
<P>Booragoon, WA, 6154, Australia</P>
<P>Voice: +61 9 388 8814</P>
<P>Fax: +61 9 388 8813</P>
<P>E-mail: <A HREF="mailto:lou@ndg.com.au"><TT>lou@ndg.com.au</TT></A></P>
<P>URL: <A HREF="http://www.ndg.com.au"><TT>http://www.ndg.com.au</TT></A>
<H3><FONT COLOR="#000077"><B>WebBoy</B></FONT></H3>
<P>WebBoy is a complete Internet/intranet monitoring package. It provides statistics
on standard Web traffic, including URLs accessed, cache hit ratios, Internet protocols,
and user-defined protocols. To aid the security-conscious administrator, WebBoy provides
a configurable alarm mechanism to enable monitoring and notification of unusual network
activity. In particular, WebBoy is invaluable in summarizing top hosts, URLs, proxies,
Web clients, servers, and alarms. WebBoy will work on both the Microsoft Windows
and Microsoft Windows 95 platforms.</P>
<P>NDG Software</P>
<P>P.O. Box 1424</P>
<P>Booragoon, WA, 6154, Australia</P>
<P>Voice: +61 9 388 8814</P>
<P>Fax: +61 9 388 8813</P>
<P>E-mail: <A HREF="mailto:lou@ndg.com.au"><TT>lou@ndg.com.au</TT></A></P>
<P>URL: <A HREF="http://www.ndg.com.au"><TT>http://www.ndg.com.au</TT></A>
<H3><FONT COLOR="#000077"><B>PacketBoy</B></FONT></H3>
<P>PacketBoy is a packet analyzer/decoder package capable of decoding many of the
commonly used LAN protocols. Protocols that can be decoded include TCP/IP, IPX (Novell
NetWare), AppleTalk, Banyan, and DECNET protocol suites. Multiple captures can be
loaded and saved to disk. To aid the security-conscious administrator, PacketBoy
provides a configurable capture trigger to automatically start packet capture when
unusual or undesirable network activity occurs. It is an ideal addition to your desktop-based
management station, or as a laptop-based portable network probe. Supports DOS and
Windows 95.</P>
<P>NDG Software</P>
<P>P.O. Box 1424</P>
<P>Booragoon, WA, 6154, Australia</P>
<P>Voice: +61 9 388 8814</P>
<P>Fax: +61 9 388 8813</P>
<P>E-mail: <A HREF="mailto:lou@ndg.com.au"><TT>lou@ndg.com.au</TT></A></P>
<P>URL: <A HREF="http://www.ndg.com.au"><TT>http://www.ndg.com.au</TT></A>
<H3><FONT COLOR="#000077"><B>Point 'n Crypt World 1.5</B></FONT></H3>
<P>Point 'n Crypt World 1.5 is a Windows extension that allows users to quickly and
easily encrypt any desktop file. It is the easiest disk/file encryption system on
the market. Based on 40-bit DES-CBC mode encryption (exportable outside North America),
Point 'n Crypt World puts a secure envelope around any document you want to keep
private. Whether it resides on a desktop, within a file system, or needs to travel
across public information highways (such as the Internet), your information will
be protected. Offering easy-to-use privacy, Point 'n Crypt World is distributed to
a varied group of users from novices to experts. Point 'n Crypt requires little or
no tutoring. Installing and using Point 'n Crypt World is elegantly simple. The installation
is brief, straightforward, and virtually foolproof. Extensive online help is included
to get you over any rough spots or to learn about Point 'n Crypt World's cryptographic
internals. Simply right-click any desktop file, select Encrypt, provide a passphrase,
and it's done. Point 'n Crypt World is available for $29.95 from the Soundcode Web
site at <TT>www.soundcode.com</TT>. For stronger encryption, check out Point 'n Crypt
Professional (list price $59.95), which supports 448-bit Blowfish and 168-bit Triple
DES.</P>
<P>Soundcode, Inc.</P>
<P>11613 124th Avenue NE, Suite G-317</P>
<P>Kirkland, WA, 98034-8100</P>
<P>Voice: 206-828-9155</P>
<P>Fax: 206-329-4351</P>
<P>Toll-Free: 1-888-45-SOUND (76863)</P>
<P>E-mail: <A HREF="mailto:pete@soundcode.com"><TT>pete@soundcode.com</TT></A></P>
<P>URL: <A HREF="http://www.soundcode.com"><TT>http://www.soundcode.com</TT></A>
<H3><FONT COLOR="#000077"><B>GeoBoy</B></FONT></H3>
<P>GeoBoy is a geographical tracing tool capable of tracing and displaying routes
taken by traffic traversing the Internet. GeoBoy allows you to locate Internet delays
and traffic congestion. GeoBoy resolves geographical locations from a series of cache
files that can be updated and customized by the user. Supports Windows 95.</P>
<P>NDG Software</P>
<P>P.O. Box 1424</P>
<P>Booragoon, WA, 6154, Australia</P>
<P>Voice: +61 9 388 8814</P>
<P>Fax: +61 9 388 8813</P>
<P>E-mail: <A HREF="mailto:lou@ndg.com.au"><TT>lou@ndg.com.au</TT></A></P>
<P>URL: <A HREF="http://www.ndg.com.au"><TT>http://www.ndg.com.au</TT></A>
<H3><FONT COLOR="#000077"><B>NetScanTools 32 Bit v2.42</B></FONT></H3>
<P>NetScanTools 32 Bit v2.42, designed by Northwest Performance Software, combines
a number of UNIX network analysis utilities in a single package that runs under Microsoft
Windows 95 and Microsoft Windows NT. Northwest Performance Software</P>
<P>PO Box 148</P>
<P>Maple Valley, WA, 98038-0148</P>
<P>Voice: 253-630-7206</P>
<P>Fax: 253-639-9865, 425-413-0745</P>
<P>E-mail: <A HREF="mailto:sales@nwpsw.com"><TT>sales@nwpsw.com</TT></A></P>
<P>URL: <A HREF="http://www.nwpsw.com/"><TT>http://www.nwpsw.com/</TT></A>, <A HREF="http://www.eskimo.com/~nwps/index.html"><TT>http://www.eskimo.com/~nwps/index.html</TT></A>
<H3><FONT COLOR="#000077"><B>WinU 3.2</B></FONT></H3>
<P>WinU is a tamper-proof replacement user interface for Windows 95 with access control,
time-limit, and security features. It's easy to set up, easy to use, and virtually
impossible to circumvent. This makes WinU excellent for parents who want to allow
children to use only certain software on the family PC. Any program or desktop can
be password-protected or time- limited. You can set up different WinU desktops, with
different programs and customizations, for each member of the family. Businesses
can use WinU to allow employees to run only authorized software, making other programs
unavailable. WinU is also ideal for public-access computers. You can let patrons
use your computers without worrying that they might change the computer's setup or
delete important files.</P>
<P>Bardon Data Systems</P>
<P>1164 Solano Avenue #415</P>
<P>Albany, CA, 94706</P>
<P>Voice: 510-526-8470</P>
<P>Fax: 510-526-1271</P>
<P>E-mail: <A HREF="mailto:bsmiler@bardon.com"><TT>bsmiler@bardon.com</TT></A></P>
<P>URL: <A HREF="http://www.bardon.com"><TT>http://www.bardon.com</TT></A>
<H3><FONT COLOR="#000077"><B>PrivaSuite</B></FONT></H3>
<P>PrivaSuite encrypts any text, fax, or file in any language and any format. It
can encrypt individual cells in a spreadsheet or encrypt the entire spreadsheet.
PrivaSuite makes compartmentalization of information simple and fast. You can encrypt
individual clauses in a contract, encrypt the whole contract, or do both--multilayer
encryption is effortless with PrivaSuite. You can encrypt files saved on your hard
drive or on the network for "eyes only" access and encrypt hard-copy documents
so that only you and the intended recipient can read them. In short, if the information
is on your computer, PrivaSuite can encrypt it with just 2-3 keystrokes, and with
virtually no interruption to your workflow. The program works in Microsoft Windows
3.<I>x</I> and 95 and employs a 56-bit DES engine (wherever allowed) or 40-bit international
engine.</P>
<P>Aliroo Ltd.</P>
<P>30100 Town Center Drive, Suite 0344</P>
<P>Laguna Niguel, CA, 92677</P>
<P>Voice: 714-488-0253</P>
<P>Fax: 714-240-2861</P>
<P>E-mail: <A HREF="mailto:steve@aliroo.com"><TT>steve@aliroo.com</TT></A></P>
<P>URL: <A HREF="http://www.aliroo.com"><TT>http://www.aliroo.com</TT></A>
<H3><FONT COLOR="#000077"><B>HideThat 2.0</B></FONT></H3>
<P>HideThat is a fully customizable secure screen saver, utilizing your logos, pictures,
and messages. Several security features are included, along with an extensive help
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -