identify » Page 5 » Developer.Team

Microsoft Advanced Threat Analytics v1.6

Microsoft Advanced Threat Analytics v1.6
Microsoft Advanced Threat Analytics v1.6 | 269 Mb


200+ days. That's the average amount of time that attackers reside within your network until they are detected, gathering classified data and information, waiting to strike at just the right moment. Microsoft Advanced Threat Analytics (ATA) helps you identify breaches and threats using behavioral analysis and provides a clear, actionable report on a simple attack timeline.
Read more

Hex Workshop v6.8.0

Hex Workshop v6.8.0
Hex Workshop v6.8.0 | 20 Mb


BreakPoint Software was established in 1995 to create quality development tools for software professionals. Our motto at the time was "For Developers by Developers" and we have kept true to that over the years by creating top-quality developer-oriented software. We are confident that our products and services will meet and surpass your needs and expectations.
Read more

Cerbero Profiler 2.5.0 Commercial

Cerbero Profiler 2.5.0 Commercial
Cerbero Profiler 2.5.0 Commercial | 19 Mb


Cerbero Profiler is a tool designed primarily for malware and forensic analysis. It supports a huge number of file formats (listed below) on which it performs analysis and lets the user inspect their internal layout. Profiler is often used to identify 0-day threats and personal information inside of files. However, given the scale of the project, it has many other uses and we encourage you to visit our blog in order to see Profiler in action.
Read more

Microsoft Advanced Threat Analytics 2016

Microsoft Advanced Threat Analytics 2016
Microsoft Advanced Threat Analytics 2016 | 247 Mb


200+ days. That’s the average amount of time that attackers reside within your network until they are detected, gathering classified data and information, waiting to strike at just the right moment. Microsoft Advanced Threat Analytics (ATA) helps you identify breaches and threats using behavioral analysis and provides a clear, actionable report on a simple attack timeline.
Read more

Idera SQL BI Manager 1.1.0.21

Idera SQL BI Manager 1.1.0.21
Idera SQL BI Manager 1.1.0.21 | 207 Mb


Monitor the health and availability of your BI environment including SQL Server Analysis Services, SQL Server Reporting Services and SQL Server Integration Services. Ensure uptime and identify issues quickly. View active sessions on SSAS server including the user name, last command, cube, session start time, and much more. In addition, you can view report execution performance from SSRS servers. Get access to data such as resource utilization, cube sizes & report generation performance from your BI environment and identify issues before they become painful. Set alerts and email notifications with configurable threshold levels to keep you informed of only the relevant information. Login from anywhere and quickly check the status of monitored SQL BI server instances. The customizable web dashboard provides at-a-glance status of top issues and alerts with easy drill down capabilities so you can identify and diagnose issues quickly.
Read more

SphinxConnector 3.10.7

SphinxConnector 3.10.7
SphinxConnector 3.10.7 | 1.6 Mb


SphinxConnector.NET offers a fluent query API that makes using Sphinx with .NET easier and more comfortable than ever. Its fluent interface has been designed for great usability and ease of use. Operating directly on your document models, it lets you create your queries in a strongly typed, LINQ-like fashion. SphinxConnector.NET supports logging different types of messages to help developers identify problems or optimize their setup. By leveraging the well-known Common.Logging library, the logging infrastructure integrates with the most commonly used .NET logging frameworks including NLog, log4net and the Microsoft Enterprise Library.
Read more

ZylGSM 1.32

ZylGSM 1.32
ZylGSM 1.32 | 211 kB


GylGSM is a Delphi & C++Builder component that communicates with a GSM modem or phone with integrated modem (almost all new generation mobile phones).

Main features:
- send SMS in text mode
- send SMS in PDU mode
- delete SMS
- dial in voice mode
- dial in data mode
- answer incoming call
- hang up current conversation
- recognize calls and identify caller number
- new SMS message alert
- read PDU and text SMS (the message text must be in GSM 7-bit charset, multipart (concatenated) SMS and Unicode SMS are not yet supported)

- detect GSM modem
- execute custom AT commands
Read more

DeployLX 5.1.r5866 Professional Licensing/Obfuscation System

DeployLX 5.1.r5866 Professional Licensing/Obfuscation System
DeployLX 5.1.r5866 Professional Licensing/Obfuscation System | 32 Mb


The DeployLX runtime is a library of copy protection methods that integrate into your product. Rather than writing custom rules in your code or learning an arcane list of methods to enforce different rules, you just call one method from the DeployLX Library. DeployLX CodeVeil performs a complete analysis of the entire application to identify all explicit and implicit dependencies, standard naming conventions and serialization requirements.
Read more

Symantec Endpoint Protection 12.1.4112.4156

Symantec Endpoint Protection 12.1.4112.4156
Symantec Endpoint Protection 12.1.4112.4156 | 763 Mb


Symantec Endpoint Protection will provide businesses of all sizes with advanced new protection while improving system performance. Complete with advanced features to secure virtual infrastructures and powered by Insight, Symantec’s award-winning community-based reputation technology, Symantec Endpoint Protection 12 will detect sophisticated new threats earlier and more accurately than any other security product. Symantec Endpoint Protection offers comprehensive defense against all types of attacks for both physical and virtual systems. It seamlessly integrates 9 essential security technologies in a single, high performance agent with a single management console.
Read more