Harden-It 1.2

Harden-It 1.2 Screenshot Harden-It is a new lightweight software release from YASC .

Developer:   YASC .ltd
      software by YASC .ltd →
Price:  0.00
License:   Freeware
File size:   0K
Language:   
OS:   Windows XP/Vista (?)
Rating:   0 /5 (0 votes)

Harden-It is a new lightweight software release from YASC .ltd and Zoller Thierry. Harden-it was created to harden your Windows installation against many attacks.

By hardening the IP stack your Network can sustain or completely twarth various sophisticated network attacks. By hardening your Local System lots of current malware, spyware, worm infection are completely blocked, proactively harden your system even against future uknown attacks.

Short Features:

  • Harden your server's TCP and IP stack
  • Protect your servers from Denial of Service and other network based attacks
  • Enable SYN flood protection when an attack is detected
  • Set the threshold values that are used to determine what constitutes an attack

    Harden-Itâ„¢ is intended for the network/server administrator or the professional internet user. You should not use this tool if you are a novice.

    Features:
  • Adjusts retransmission of SYN-ACKS. The connection responses time out more quickly during a SYN flood.
  • Determines how many connections the server can maintain in the half-open (SYN-RCVD) state before TCP/IP initiates SYN flooding attack protection.
  • Determines how many connections the server can maintain in the half-open (SYN-RCVD) state even after a connection request has been retransmitted.
  • Specifies the threshold of TCP connection requests that must be exceeded before SYN flood protection is triggered.
  • Controls how many times a SYN-ACK is retransmitted before canceling the attempt when responding to a SYN request.
  • Determines how many times TCP retransmits an unacknowledged data segment on an existing connection. TCP retransmits data segments until they are acknowledged or until this value expires.
  • An attacker could force the MTU to a very small value and overwork the stack by forcing the server to fragment a large number of packets.
  • This setting controls how Windows manages connection keep alive transmissions. Specifies how often TCP attempts to verify that an idle connection is still intact by sending a keep-alive packet.
  • A denial of service (DoS) attack against Windows servers is to send it a "name release" command. This will cause it to release its NetBIOS, preventing clients from accessing the machine
  • Internet Control Message Protocol (ICMP) redirects cause the stack to plumb host routes.
  • Disables ICMP Router Discovery Protocol (IRDP) where an attacker may remotely add default route entries on a remote system.
  • Determines whether TCP performs dead gateway detection. An attacker could force the server to switch gateways, potentially to an unintended one.
  • Specifies AFD.SYS functionality to withstand large numbers of SYN_RCVD connections efficiently.
  • Specifies the minimum number of free connections allowed on a listening endpoint. If the number of free connections drops below this value, a thread is queued to create additional free connections.
  • Specifies the maximum total amount of both free connections plus those in the SYN_RCVD state. Set to lowest for Workstations!
  • Specifies the number of free connections to create when additional connections are necessary.
  • This parameter is used to prevent address sharing (SO_REUSEADDR) between processes so that if a process opens a socket, no other process can steal data from it.
  • NAT is used to screen a network from incoming connections. An attacker can circumvent this screen to determine the network topology using IP source routing. Disables IP source routing.
  • Processing fragmented packets can be expensive. Although it is rare for a denial of service to originate from within the perimeter network, this setting prevents the processing of fragmented packets.Prevents the IP stack from accepting fragmented packets.
  • Multicast packets may be responded to by multiple hosts, resulting in responses that can flood a network. The routing service uses this parameter to control whether or not IP multicasts are forwarded. This parameter is created by the Routing and Remote Access Service.
  • Your computers running Windows may be responding to Address Mask requests on the network, which could enable malicious users to discover some of your network topology information.
  • By default, the DNS resolver accepts responses from the DNS servers that it did not query. This feature speeds performance but can be a security risk.
  • Malicious User Can Shut Down Computer Browser Servic. An vulnerability exists in the computer browser protocol ResetBrowser frame that could allow a malicious user to shut down a computer browser on the same subnet, or shut down all of the computers browsers on the same subnet.
  • Windows NT has a feature where anonymous logon users can list domain user names and enumerate share names.Users who want enhanced security have requested the ability to optionally restrict this functionality.
  • A hidden share is identified by a dollar sign ($) at the end of the share name. Hidden shares are not listed when you look through the shares on a computer or use the net view command. If enabled this option will hide all the administrative shares.
  • Determines how many times TCP sends an Address Request Packet for its own address when the service is installed. This is known as a gratuitous Address Request Packet.
  • Determines the time that must elapse before TCP can release a closed connection and reuse its resources. This interval between closure and release is known as the TIME_WAIT state or 2MSL state.

    tags how many  free connections  determines how  specifies the  syn rcvd  the server  shut down  many times  fragmented packets  rcvd state  computer browser  harden your  the network  

    Harden-It 1.2 screenshot


    Download Harden-It 1.2

     Download Harden-It 1.2


    Authors software

    Harden-It 1.2 Harden-It 1.2
    YASC .ltd

    Harden-It is a new lightweight software release from YASC .

    Similar software

    Harden-It 1.2 Harden-It 1.2
    YASC .ltd

    Harden-It is a new lightweight software release from YASC .

    RemoteNetstat 1.3.4 RemoteNetstat 1.3.4
    Nsasoft llc

    Remote Network Statistics will display remote network computer IP, ICMP, TCP, UDP and Server statistics, shows the details about IP datagrams including forwarding enabled-disabled state, default time to live, the number of received datagrams, datagrams with address, protocol errors, header, forwarded datagrams, incoming datagrams that have been discarded, sent datagrams, delivered datagrams, routing datagrams that have been discarded, datagrams withought routing, interfaces, local host Ip address, TCP segments including timeout algorithm, minimum and maximum timeouts in milliseconds, the number of maximum connections, opened active and passive connections, failed connections, reset connections, currently established connections, received segments, sent segments, retransmitted segments, received errors, segments, which have been sent with reset flag, cumulative connections, details about UDP datagrams the number of received datagrams, datagrams without port, datagrams with errors, sent datagrams, listening connections, ICMP messages in incoming and outgoing states including the number of messages, errors, unreachable messages, TTL exceeded messages, messages with parameter problems, source quench messages, redirected messages, echo messages, echo replies, time stamp replies, address mask messages, address mask replies,etc.

    PingIt 2.0 PingIt 2.0
    Desktop Software

    The Program is a free program and intended for monitoring speed of your internet connections or monitoring of speed to certain IP-address.

    Bandwidth Management and Firewall 1.1.0 Bandwidth Management and Firewall 1.1.0
    softinengines.com

    Bandwidth Management and Firewall will allow to limit bandwidth for some computer or group of computers comunicating from/to internet or to limit bandwidth for some network service.

    Incoming Packet Monitor 0.5 Incoming Packet Monitor 0.5
    Kushinara

    Incoming Packet Monitor is a packet monitor designed to monitor SYN packets.

    AS3 Personal Firewall 1.6 AS3 Personal Firewall 1.6
    AS3 Soft4U

    AS3 Personal Firewall is device designed to prevent outsiders from accessing your network.

    fileXfer 1.5 fileXfer 1.5
    United Business Technologies

    fileXfer is a useful application which allows remote machine access for: Files, Registry, Processes, and Services.

    ZedMon 3.24 ZedMon 3.24
    Toucan IT

    ZedMon is a NetWare server monitoring tool that provides network administrators with at-a-glance information on user activity, network address, login time and protocol preference, as well as server utilization and open file information.

    IP Sniffer 1.91.5.0 IP Sniffer 1.91.5.0
    Erwan L.

    IP sniffer is a protocol analyzer, that will use the XP/2K Raw Socket features.

    VisualSniffer 2.0 VisualSniffer 2.0
    BVTech Inc

    VisualSniffer is a powerful packet capture tool and protocol analyzer (ip sniffer or packet sniffer) for Windows system.

    Other software in this category

    Folder Size Shell Extension 3.2 Folder Size Shell Extension 3.2
    Space Dolphin

    Folder Size Shell Extension is a handy shell extension that adds a new tab to the Properties dialog that displays a folder`s or drive`s size.

    MouseCam 1.0 MouseCam 1.0
    CamTech

    MouseCam is a free little tool that zooms everything your cursor is over up to 20 times its normal size.

    Microsoft Windows XP Plus! Service Pack 1 Microsoft Windows XP Plus! Service Pack 1
    Microsoft Corp.

    Microsoft has released an update for its addon utility: Microsoft Plus! designed for the Windows XP operating system.

    ServiceManager 1.00 ServiceManager 1.00
    L5 Software Group, LLC

    ServiceManager is an application designed to allow System Administrators, Developers and Power Users an easy means to view, modify or remove services and their information.

    Command Finder 1.0 Command Finder 1.0
    UCG Media

    UCG Command Finder was created as a compliment for the Universal Command Guide to make it even easier, when you need a command, to find it.