Internet Security Systems, Inc. (ISS)


SAFEsuite(TM) is a family of network security assessment tools designed to audit, monitor and correct all aspects of network security. Internet Scanner is the fastest, most comprehensive, proactive UNIX and Windows NT security scanner available. It configures easily, scans quickly, and produces comprehensive reports. Internet Scanner probes a network environment for selected security vulnerabilities, simulating the techniques of a determined intruder. Depending on the reporting options selected, Internet Scanner provides information about each vulnerability found: location, in-depth description, and suggested corrective actions. (Requires Windows NT)


Adobe Inc.


Adobe's Acrobat viewer.

Crack for Netware v1.2

Roy Coates


The sole purpose of Crack is to ensure that your users have set sensible, and secure passwords. It achieves this by comparing user passwords to: 1. The username. 2. Words held in the users REALNAME property. 3. A dictionary of words.

Crack is freeware for non-profit use, all I ask is that you e-mail me a short message if you find the program useful, find bugs, have ideas for improvement etc.

DataGuard 1.3 demo release

Secure Link Services AG


DataGuard(R) is a program that allows secure and rapid enciphering of files and directories. Data encrypted in this way can be sent using standard E-mail programs via public networks (e.g. the Internet) guaranteeing secure data transmission. The use of efficient, optimized algorithms reduces high performance losses in the system due to the encryption and decryption process, without endangering security. Requires Windows 95 or NT 4.

File Lock series

D & L Computing


File Lock 95 Lite uses the Standard or Enhanced encryption method to protect in general any information that is for your eyes only such as a personal diary or finance information.

File Lock 95 Standard includes two additional encryption methods, the RUBY and the Diamond. This is ideal for business related information protection.

File Lock Wizard for Windows 95 is the easiest of the File Lock series. It comes complete with three encryption algorithms with four compression algorithms. It is the best in data protection for the home PC user.

These products require Windows 95 or NT and are fully functional trial versions with limited number of days.

File Rules



File Rules allows users to set up administration rules for local or network drives, and execute them at lightning speed. FileRules operates by scanning the target drive(s), and applying sets of rules to each file.

HideThat 2.0

CobWeb Applications


HideThat is a fully customizable secure screen saver, utilizing your logos, pictures and messages. Several security features are included, along with an extensive help file on PC security. HideThat works on the Microsoft Windows 95 platform.

NetAlert V 1.0

Christopher L. T. Brown


A 32 bit console mode application for Microsoft Windows NT. This program will monitor status of a TCP/IP network port by checking to see if the port is listening. When the port goes down or up it will send ether an email alert or page you or both. You can use this application to check your Internet connection by setting it to check a well known port on your service providers network. If NetAlert loosed the connection it will alert you.

This program is shareware. If you use it for more than 30 days send $10.00 to:

Christopher L. T. Brown
2071 Lakeridge Cr. #104
Chula Vista, Ca. 91913

Questions or comments contact Chris Brown at

Netman tool-set

NDG Software


Evaluation versions of GeoBoy, EtherBoy, WebBoy, and PacketBoy for Windows 95 and NT 4.

GeoBoy is a geographical tracing tool capable of tracing and displaying routes taken by traffic traversing the Internet. GeoBoy allows you to locate Internet delays and traffic congestion. GeoBoy resolves geographical locations from a series of cache files which can be updated and customized by the user.

EtherBoy gives you affordable real-time multi protocol network monitoring on your IBM compatible PC. It provides insights and answers to a large number of network management and usage questions. Because EtherBoy is totally passive, no additional load is placed on your network resources. It is an ideal addition to your desktop based management station, or as a laptop based portable network probe. A unique tool that combines many security techniques into a single pacakge.

WebBoy is a complete Internet/Intranet monitoring package. It provides statistics on standard Web traffic including URLs accessed, cache hit ratios, Internet protocols and user defined protocols. To aid the security conscious administrator, WebBoy provides a configurable alarm mechanism to enable monitoring and notification of unusual network activity. In particular, WebBoy is invaluable in summarizing top hosts, URLs, proxies, Web clients, servers and alarms.

PacketBoy is a packet analyser/decoder package capable of decoding many of the commonly used LAN protocols. Protocols which can be decoded include TCP/IP, IPX (Novell NetWare), AppleTalk, Banyan and DECNET protocol suites. Multiple captures can be loaded and saved to disk. To aid the security conscious administrator, PacketBoy provides a configurable capture trigger to automatically start packet capture when unusual or undesirable network activity occurs. It is an ideal addition to your desktop based management station, or as a laptop based portable network probe.

NetScanTools 32 Bit v2.42

Northwest Performance Software


NetScanTools 32 Bit v2.42, designed by Northwest Performance Software, combines a number of UNIX network analysis utilities in a single package that runs under Microsoft Windows 95 and Microsoft Windows NT.

NetSpy 6.04

Robert Fischer


This directory contains a new version of NetSpy for Windows NT 4.00 (or higher). NetSpy is an IP-based network-monitoring-tool.

pcANYWHERE32 v7.5



Symantec's pcANYWHERE32 v7.5 is the first mobile access and remote control solution specifically designed for both Windows 95 and Windows NT. As the only remote access offering on the market today to be Windows 95, Microsoft BackOffice and CA-Unicenter certified corporate users can be assured that Symantecís new product meets the industryís highest quality and reliability standards for mission critical use.

The software version provided on this CD is a 30-day trial version. For more information, visit the Symantec Web site.

PGP for Groupwise

Risch Consulting


PGP for GroupWise provides seamless integration between GroupWise versions 4.1 and 5.x and either the DOS or Windows versions of PGP. With the software you can create public encryption keys, mail your keys to others, encrypt digitally sign, decrypt, and verify digital signatures in order to maintain privacy in your Internet or Intranet communications. Attached documents can by encrypted as well.

Point 'n Crypt World 1.5

Soundcode, Inc.


Point 'n Crypt World 1.5 is a Windows extension that allows a user to quickly and easily encrypt any desktop file. It is the easiest disk/file encryption system on the market. Based on 40-bit DES-CBC mode encryption (exportable outside North America) Point 'n Crypt World puts a secure "envelope" around any document you want to keep private. Whether it resides on a desktop, within a file system, or needs to travel across public information highways (like the Internet), your information will be protected. Offering easy-to-use privacy, Point 'n Crypt World is being distributed to a varied group of users, from novices to experts. Point 'n Crypt is so easy to use, it requires little or no tutoring. Installing and using Point 'n Crypt World is elegantly simple. The installation is brief, straightforward, and virtually fool-proof. Extensive on-line help is included to get you over any rough spots or to learn about Point 'n Crypt World's cryptographic internals. Simply "right-click" on any desktop file, select Encrypt, provide a passphrase and it's done. Point 'n Crypt World is available for $29.95, from the Soundcode web site at For stronger encryption, check out Point 'n Crypt Professional (list price $59.95), which supports 448-bit Blowfish and 168-bit Triple DES.

PowerTCP Internet Toolkit for Visual Basic 4.0/5.0

Dart Communications


Quickly make any Windows application "internet-aware". Build TCP/IP applications in any development environment with Winsock-compliant ActiveX (OCX), VBX, DLL, Delphi Components and C++ libraries. TCP, TELNET, FTP, SMTP, POP3, VT320 emulation, TFTP, UDP, SNMP, FINGER, REXEC, RLOGIN, RSHELL, TIME and WHOIS components provide powerful capabilities you can use immediately. Comprehensive template applications with source code and support are included, to accelerate your project to completion!

To operate this fully functional trial version of PowerTCP Internet Toolkit for Visual Basic 4.0/5.0, please contact the Sales Department at Dart Communications for a trial license key. This key will allow you uninterrupted operation of PowerTCP for 30 days. If you'd like to purchase the toolkit after 30 days, contact Dart Sales.


Aliroo Ltd.


PrivaSuite encrypts any text, fax, or file in any language and any format. Encrypt individual cells in a spreadsheet, or encrypt the entire spreadsheet. PrivaSuite makes compartmentalization of information simple and fast. Encrypt individual clauses in a contract, encrypt the whole contract, or do both -- multi-layer encryption is effortless with PrivaSuite. Encrypt files saved on your hard drive or on the network for "eyes only" access. Encrypt hard-copy documents so that only you and the intended recipient can read them. In short, if the information is on your computer, PrivaSuite can encrypt it with just 2-3 keystrokes, and with virtually no interruption to your workflow. The program works in Microsoft Windows 3.x and 95 and employs a 56-bit DES engine (wherever allowed) or 40-bit international engine. A powerful tool to enhance your privacy.


Server Systems Limit (SERVERSYSTEMS-DOM)


SecureConsole for NetWare is a fileserver console security application that adds a new level of control and accountability to the NetWare server. It restricts access for individual users or NetWare security groups to specific server commands or applications. SecureConsole also records the commands performed by each logon. SecureConsole acts like a screen saver on the console forcing the user to identify themselves with a valid NetWare login and password. If the user is authorized to access the server, SecureConsole unlocks the screen but continues to verify the users actions against their list of authorized functions and application screens. This means that different users or groups can have different levels of access. Installation of SecureConsole is simple! The software can be installed through the NetWare v4 product installation program or by copying the program to the server manually. No special NetWare queues, setup files or license files are required and the product is NOT serialized. This allows software distribution products or batch installation to multiple fileservers.

Shade Disk Encryption 1.0

Soft Winter Corporation


Shade allows you to create encrypted disk device inside a file. Such a device can then be formated using any file system (like NTFS or FAT) and used as a regular disk. The only difference is that Shade will encrypt the data on every write operation and decrypt it on every read operation. Requires Windows NT 4.

Unregistered copy of SHADE has encryption options disabled. Get a free trial license for full functionality for 21 days.


TechSmith Corporation


SnagIt allows Windows users to capture an entire screen, an individual window or a user defined portion of the screen. SnagIt also accepts input directly from the Windows clipboard or a Windows bitmap (BMP) file. Once captured, SnagIt will send the image to the printer, the clipboard, a graphics file or to e-mail.

Cetus StormWindows

Cetus Software Inc.


Cetus StormWindows [TM] for Windows 95 will allow the authorized user to add several types and degrees of protections to the desktop and system of a Windows 95 computer. Intelligent use of StormWindows security measures will allow secure use of any shared Windows 95 PC. (A version for Windows NT 4 is under development.) Examples of desktop protections include: hiding all desktop icons; hiding Start Menu Programs groups and links; preventing the saving of desktop changes; hiding all drives in "My Computer"; hiding the Start Menu Settings Folders (Control Panel and Printers) and/or Taskbar; and hiding the entire "Network Neighborhood", or just "Entire Network" or "Workgroup Contents" within it. Some of the system protections include: disabling the MS-DOS prompt and/or the exiting to MS-DOS mode; preventing "warm booting" (Ctrl-Alt-Del); blocking the running of Registration Editor and/or System Policy Editor; preventing the merging of .REG files into the Registry; preventing the addition or deletion of printers; keeping empty the Documents Menu; and individually hiding "sensitive" Control Panel pages and settings. StormWindows security schemes may be imported from and exported to other computers by diskette. StormWindows changes do not require the use of policies. StormWindows protections would probably be most useful to someone in charge of a number of computers at a school or business, a network manager, or a parent. Access to StormWindows is password protected.

SystemScanTools Shareware v1.12 Version

Northwest Performance Software


SystemScanTools is a system cleanup and file information utility. It locates duplicate files. It helps you identify unused DLLs (you must make the final determination). Provides general system information.

Windows Task-Lock, version 4.1

Posum L.L.C.


Windows Task-Lock, version 4.1 provides a simple and inexpensive, but effective way to password protect specified applications for Windows 95 no matter how they are executed. It is easy to configure and requires little to no modifications to your current system configuration. Optional Sound events, stealth mode, and password timeout now included. Administrator password enabled for site licenses. OnLine help is provided. (Windows 95 required.)

The Greg Miller Novell Hacking Suite

Greg Miller


An exploit program template for the login spoofing attack against NetWare.

Program which allows the use of a pre-generated word list to crack passwords on 3.x.

A slightly optimized NetWare hash function for off-line attacks.

A program to perform an MITM attack on the NetWare 3.x login protocol with a single machine.


NetPartners Internet Solutions, Inc.


WebSENSE is an advanced Internet content screening system which allows organizations to monitor and/or eliminate network traffic to Internet sites deemed inappropriate or otherwise undesirable in their networked environment. WebSENSE is implemented as a Windows NT service running on a single Windows NT computer, eliminating the need for software to be loaded on individual user workstations. Additionally, WebSENSE supports a wide range of TCP protocols including: HTTP, Gopher, FTP, TELNET, IRC, NNTP & RealAudio. The recommended minimum requirements are: Intel 486, 16 MB RAM, Windows NT 3.51 (or greater).

Windows Enforcer

Posum L.L.C.


Windows Enforcer, version 4.0 protects systems that are accessible to many people and require a consistent configuration and a consistent, limited selection of services such as public displays or computer labs. It is also great for child-proofing individual systems. This is accomplished by insuring that user specified tasks either never run, always run, or are allowed to run. It is easy to configure and requires little to no modifications to your current system configuration. Optional user specified sounds for the startup and access denied events are also available. Online help is provided. (Windows 3.x and Windows 95).

WinU 3.2

Bardon Data Systems


WinU is a tamper-proof replacement user interface for Windows 95 with access control, time-limit and security features. It's easy to set up, easy to use and virtually impossible to circumvent. This makes WinU excellent for parents who want to allow children to use only certain software on the family PC. Any program or desktop can be password-protected or time-limited. You can set up different WinU desktops, with different programs and customizations, for each member of the family. Businesses can use WinU to allow employees to run only authorized software, making other programs unavailable. WinU is also ideal for public-access computers. You can let patrons use your computers without worrying that they might change the computer's setup, or delete important files.


Nico Mak Computing, Inc.


Have you ever used the Internet or CompuServe? If so, you've probably encountered ZIP files. Are you a Windows user? If so, WinZip is THE way to handle these archived files. WinZip brings the convenience of Windows to the use of Zip files and other compression formats.

WinZip Self-Extractor

Nico Mak Computing, Inc.


WinZip Self-Extractor is a utility program that creates native Windows self-extracting ZIP files. These self-extracting ZIP files are ideal for electronic file distribution because they: (1) can contain multiple compressed files, ensuring that important files do not become separated from the rest of the package; (2) allow the receiver to use a familiar Windows interface to decompress files, without owning or knowing how to use a separate unzip utility; and (3) optionally run a "setup" or "installation" program, which may be included by the developer when the files are decompressed.

WorkStation Lock, Version 2.2

Posum L.L.C.


WorkStation Lock provides a simple and inexpensive, but effective way to password protect your system at startup or quickly from a desktop shortcut without involving a screen saver. It is easy to configure and requires no modifications to your current system configuration. Administrator functions are enabled for site licenses.