|
|
Infiltrator's Features
|
|
Infiltrator
is powered by an extremely easy to use interface
allowing quick access to all of its powerful and
unique features. Read on to view Infiltrator's exciting
features.
Information Gathering and Scanning |
Infiltrator uses the very same scanning techniques
that hackers and intruders would use to
infiltrate your network and computers.
In this fashion, you can see 'what a hacker
sees' before they have a chance by scanning
each computer on your network one IP at
a time. Infiltrator scans target computers
and attempts to enumerate as much information
as possible. Infiltrator allows you to
enter IP addresses, computer names, domains,
website hosts, and IP ranges for easy scanning.
Information that is enumerated includes,
but is not limited to:
Infiltrator in
Action - Screenshots:
|
Security
Auditing and Analysis |
Infiltrator can audit each scanned computer
and alert you of the following events using
its own updatable, built-in auditing database:
Infiltrator in
Action - Screenshots:
|
Generate
Sleek Scan Reports |
Infiltrator can generate brief or complete
reports based on your scan results. Brief
reports allow for scan results of one target,
while complete results can encompass an entire
network's scan results into one organized,
easy to present and follow report. Complete
reports include descriptions and analysis
of all results and conclude with evaluations
of each computer's security levels. Reports
are fully customizable (via html templates)
and are easily presented in web or print
format.
Infiltrator
in Action -
Screenshots:
|
Many
Useful Network Utilities |
Infiltrator comes with many built in network
utilities, creating a robust suite of networking
solutions suitable for any users. Utilities
included:
Infiltrator in
Action - Screenshots:
|
User-Friendly,
Intuitive Interface |
Infiltrator boasts a user interface unmatched
by any other network security software.
Infiltrator's easy to use, intuitive interface
allows you to get started immediately with
no having to 'learn the software'. Here
are some key features of Infiltrator's
powerful interface:
Infiltrator in
Action - Screenshots:
|
|
|
|
|
Download Infiltrator today to scan, audit,
and protect your network immediately!
|
OS:
Memory:
Disk Space:
|
Windows
128MB RAM
3 MB |
|
|