Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

5/22/2009
04:26 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

10-Strike Software Releases 10-Strike Connection Monitor Pro 1.6

Real-time monitoring prevents malware infection over shared folders in Windows

This easy way of sharing documents over a LAN often becomes a way for distributing viruses and other malicious software when shared folders are left unattended to. 10-Strike Connection Monitor eliminates the breach by keeping an eye on the activity inside shared folders and alerting the administrator of suspicious events.

On an attempt to access a shared folder, the monitor captures the user's host name, records it into the log file and alerts the resource owner. Whatever the user does while connected to the protected computer - browsing folders, downloading or uploading anything to them - it is registered in the log file and reported to the resource owner.

The monitor can be configured to alert the administrator when certain users attempt to access shared folders, prevent blacklisted users from accessing shared folders or launch a security application when an intruder attempts to accesses a restricted file. The new version 1.6 of Connection Monitor can also alert when users attempt to create or delete folders inside shared resources and register such attempts in the log file. While watching after shared folders, the new version can optimize the network load: If a user has been idle for longer than allowed, the monitor closes the connection and allows someone else to use this connection slot.

The Pro version of the application can run fully automatically, as a service, protecting shared folders without the attendance of the owner.

###

Availability and Pricing:

The free evaluation version can be downloaded at http://www.10-strike.com/connectionmonitor/

The Pro version can be purchased at $99.95 US. The regular (non-service) version can be purchased at $39.95 US.

If you would like to get a comment, request a reviewer copy, or have any other inquiries, please contact Dmitriy Stepanov at [email protected]

System Requirements:

A standard PC with Windows NT4/2000/XP/2003/Vista/2008/7 with a local network and shared folders.

Company: 10-Strike Software

E-mail: [email protected]

Contact Name: Dmitriy Stepanov

Product Page: http://www.10-strike.com/connectionmonitor/

Download: http://www.10-strike.com/connectionmonitor/download.shtml

Screenshot: http://www.10-strike.com/connectionmonitor/connection-monitor.jpg

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
SOC 2s & Third-Party Assessments: How to Prevent Them from Being Used in a Data Breach Lawsuit
Beth Burgin Waller, Chair, Cybersecurity & Data Privacy Practice , Woods Rogers PLC,  12/5/2019
Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "This is the last time we hire Game of Thrones Security"
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0242
PUBLISHED: 2019-12-09
mod_wsgi module before 3.4 for Apache, when used in embedded mode, might allow remote attackers to obtain sensitive information via the Content-Type header which is generated from memory that may have been freed and then overwritten by a separate thread.
CVE-2015-3424
PUBLISHED: 2019-12-09
SQL injection vulnerability in Accentis Content Resource Management System before the October 2015 patch allows remote attackers to execute arbitrary SQL commands via the SIDX parameter.
CVE-2015-3425
PUBLISHED: 2019-12-09
Cross-site scripting (XSS) vulnerability in Accentis Content Resource Management System before October 2015 patch allows remote attackers to inject arbitrary web script or HTML via the ctl00$cph_content$_uig_formState parameter.
CVE-2015-7892
PUBLISHED: 2019-12-09
Stack-based buffer overflow in the m2m1shot_compat_ioctl32 function in the Samsung m2m1shot driver framework, as used in Samsung S6 Edge, allows local users to have unspecified impact via a large data.buf_out.num_planes value in an ioctl call.
CVE-2015-0841
PUBLISHED: 2019-12-09
Off-by-one error in the readBuf function in listener.cpp in libcapsinetwork and monopd before 0.9.8, allows remote attackers to cause a denial of service (crash) via a long line.