Download Shareware and Freeware Software for Windows, Linux, Macintosh, PDA

line Home  |  About Us  |  Link To Us  |  FAQ  |  Contact

Serving Software Downloads in 956 Categories, Downloaded 50.472.071 Times

GFI LANguard SELM 

  Date Added: August 16, 2008  |  Visits: 2.615

GFI LANguard SELM
Full screenshot

Report Broken Link
Printer Friendly Version


Product Homepage
Download (543 downloads)

LANguard Security Event Log Monitor is a network wide event log monitor that retrieves logs from all NT/2000 servers and workstations and immediately alerts the administrator of possible intrusions for immediate host based intrusion detection. Using the LANguard event viewer you can also create network wide reports and identify machines being targeted as well as local users trying to hack internal company information. Because LANguard analyses the system event logs, rather than sniffing network traffic like traditional IDS products do, LANguard S.E.L.M. is not impaired by switches, IP traffic encryption or high speed data transfer.

Requirements: No special requirements
Platforms: Windows 2000, Windows XP
Keyword: Event Log Event Log Management Event Logs Intrusion Detection Winamp
Users rating: 0/10

License: Freeware Size: 13.48 MB
GFI LANGUARD SELM RELATED
Network Information Tools  -  Securepoint Intrusion Detection 2.0 2.07
The Securepoint Intrusion Detection System (nuzzler basic) allows to analyse your network for intrusion detections. Nuzzler basic is a full Intrusion Detection System using your local Computer. Nuzzler can detect possible attacks, viruses, trojans...
1.66 MB  
Science  -  Intrusion Detection Exchange Arch. 1.2
A Java-based client-server architecture for processing network intrusion detection data. The server receives XML alerts from Snort sensors buffers them for review by clients. The console provides a real-time view of IDS activity.
2.48 MB  
Network Monitors  -  Windows Event Log Monitoring 12.10.01
Lepide Event Log Manager is a comprehensive Windows event log monitor tool that helps enterprises in efficient log management. With the help of this application, organizations can carry out comprehensive log analysis by continuously monitoring...
31.6 MB  
Network Monitors  -  Lepide Event Log Manager 12.10.01
Lepide event log manager is a comprehensive event log management solution for event log archiving, consolidation, browsing, monitoring and reporting. It helps to collect all Windows and W3C events from computers available on the network and makes...
31.6 MB  
Utilities  -  GFI EventsManager 2011
GFI EventsManager is an award-winning events monitoring, management and archiving solution, used by thousands of customers. Competitively priced, it is ideal for SMEs. It supports a wide range of event types such as W3C, Windows events, Syslogs...
56.9 MB  
Utilities  -  ProM Import Framework 3.1
ProM Import Framework project allows you to extract process enactment event logs from a set of information systems. These can be exported in the MXML format, which is the standard event log data format for Process Mining analysis techniques....
419.84 KB  
Network Monitors  -  NXLog Community Edition 2.9.1716
The NXLog Community Edition is an open source, high-performance, multi-platform log management solution. In concept NXLog is similar to syslog-ng or rsyslog, but it is not limited to unix and syslog only. It supports different platforms, log...
3.79 MB  
Utilities  -  SID-IDS 0.4.2
SID-IDS is a host intrusion detection system. Shell/PTY Intrusion Detection: Aims at detecting unwanted PTY action on UNIX systems. SID-IDS is a Host Intrusion Detection System. Consists of a kernel part and a user part. The kernel part plugs into...
59.39 KB  
Utilities  -  check-ps 0.8.5
Devialog is a behavior/anomaly-based syslog intrusion detection system which detectsattacks via anomalies in syslog. Present log-based IDS: Nearly all present log-based intrusion detection systems operate using a pre-defined known signature...
22.53 KB  
Security Tools  -  checkps 1.3.2.1
Devialog is a behavior/anomaly-based syslog intrusion detection system which detectsattacks via anomalies in syslog. Present log-based IDS: Nearly all present log-based intrusion detection systems operate using a pre-defined...
20.48 KB  
NEW DOWNLOADS IN WINDOWS SOFTWARE, SECURITY TOOLS
Windows Software  -  iTop Screen Recorder 4.5.0.1385
iTop Screen Recorder is an all-in-one screen recorder, video editor, and screenshot tool. It helps capture anything on your PC screen to be a high-quality video file or screenshot, as well as edit the recorded videos and local videos to make them...
144.59 MB  
Windows Software  -  Lock Cursor Tools 7.0
Lock Cursor Tools simply locks the mouse cursor. You may choose a predetermined area, the primary or secondary monitor screen or part of the window of a particular application. Lock Cursor Tools makes your computer work more productively by...
1.34 MB  
Windows Software  -  Sync2 Cloud 2.10
Synchronizing Outlook between multiple sources now made easy with Sync2 Cloud, powerful Microsoft Outlook synchronization software. Sync Outlook Calendar, Contacts and Tasks between multiple sources. Share Outlook Calendar with others without...
28.29 MB  
Windows Software  -  WDZ Hash Generator 1.0
A simple program that can generate hashes such as md5, sha1, sha2 and many others. Hash function - a function assigning any short number to any large number, always having a fixed size, non-specific, quasi-random value, so-called irreversible...
2.27 MB  
Windows Software  -  WriterHelper 1
WriterHelper consist of WordNet Dictionary, WordNet Thesaurus, Plagairism Checker, Encryption using TripleDES, DES, and AES. WriterHelper helps you to search for dictionary, thesurus using WordNet Dictionary, Encrypt Text using AES, DES,...
223 KB  
Security Tools  -  WinGPG 1.0.1.1
WinGPG developed by Scand Ltd. is a tray-based classical Windows application and a classic GPGv2 distribution (we use the cryptography from the official site without making any modifications). It supports the following operations:...
9.39 MB  
Security Tools  -  USB Lockit 1.0
USB Lockit - Password Lock USB Drive. Protects the USB drive with your photos, audios, videos and other files from prying eyes on Android & Windows. Once the drive is locked, nobody can access your files. All in 3 Easy Steps: 1. To lock...
11 KB  
Security Tools  -  Overwrite Program 1.4
Overwrite Program is a program that overwrites empty space on disk, data and metadata. The operating systems and programs automatically write and delete data on disk, for example text editors may save copies of the document for recovery and...
407 KB  
Security Tools  -  Security Camera Viewer 5.2
If you have one or more IP cameras, then you also need software that is able to receive and display a video stream from these devices. Most likely you will also want to monitor access to the rooms in automatic mode. A modern security system should...
29.53 MB  
Security Tools  -  Action1 Restart Remote Computer 2.5
Reboots multiple remote computers. This free remote reboot application restarts multiple computers remotely instead of performing command line restarts, running remote reboot commands to reboot Windows from command line or running PowerShell...
5.28 MB