|
|
Infiltrator's Features
|
|
Infiltrator
is powered by an extremely easy to use interface
allowing quick access to all of its powerful and
unique features. Read on to view Infiltrator's exciting
features.
Information Gathering and Scanning |
Infiltrator uses the very same scanning techniques
that hackers and intruders would use to
infiltrate your network and computers.
In this fashion, you can see 'what a hacker
sees' before they have a chance by scanning
your computer in seconds. Infiltrator scans
your computer and attempts to enumerate
as much information as possible. Information
that is enumerated includes, but is not
limited to:
Infiltrator in
Action - Screenshots:
|
Security
Auditing and Analysis |
Infiltrator can audit your scanned computer
and alert you of the following events using
its own updatable, built-in auditing database:
Infiltrator in
Action - Screenshots:
|
Generate
Sleek Scan Reports |
Infiltrator can generate brief or complete
reports based on your scan results. Brief
reports present a short report on what was
found on your computer. Complete reports
include descriptions and analysis of all
results and conclude with evaluations of
your computer's security levels.
Infiltrator
in Action -
Screenshots:
|
Many
Useful Network Utilities |
Infiltrator comes with many built in network
utilities, creating a robust suite of networking
solutions suitable for any users. Utilities
included:
Infiltrator in
Action - Screenshots:
|
User-Friendly,
Intuitive Interface |
Infiltrator boasts a user interface unmatched
by any other network security software.
Infiltrator's easy to use, intuitive interface
allows you to get started immediately with
no having to 'learn the software'. Here
are some key features of Infiltrator's
powerful interface:
Infiltrator in
Action - Screenshots:
|
|
|
|
|
|