Home | Submit a file | New | Categories | RSS Feeds | Blog
Free Software Advertising
"DragonWAF 2010 Trial (Eng)" snapshot
DragonWAF 2010 is a host-based web application firewall, targeted to filter and prevent malicious coding attacks at personal and small-to-medium business web sites hosted on Microsoft IIS Web Server.
001 Picture Recovery is a reliable picture recovery tool for users to recover pictures lost due to accidental deleting, formatting, and other unknown reasons from PC, SD card, USB Drive and other storage devices.
AutoMe is a reliable and user-friendly windows automation software and macro recorder with task scheduler, color checker. AutoMe is very easy to use, you can record robot, and run it as many time as needed. No programing needed.
17% of users liked this software
December 25, 2009
Description from the Publisher
DragonWAF Identification Technologies
1. SQL Injection Prevention
Remote attackers send requests to gain access on IIS web server, causing data leakage or data deletion. DragonWAF can identify the attacks, analyze, filters them.
2. Buffer Overflow Protection
Buffer Overflow is an anomaly that stores data in a buffer outside the memory the programmer set aside for it. The extra data overwrites adjacent memory, which may contain program variables and program flow control data. DragonWAF can control the request length.
3. HTTP Methods Protection
Illegal commands that will cause data loss or tamper on web server, DragonWAF administrators can analyze, classify, filter and protect web servers from any incoming requests.
4. Shellcode Exploits Prevention
A standard English website environment is free of high-bit commands communication that could cause damage to server data, whereas in other language there will be complicated coding or high-bit requests targeting on IIS Web Servers.
5. Encoding Attack Prevention
The variety of “encoding attacks” are sent to IIS Web Server are deceitful, trying to beat default policy. DragonWAF is able to identify such attacks, analyze risk level and filter them.
6. Keyword Strings Filtering
DragonWAF is able to eliminate such commands. This type of command attempts to create a buffer overflow on web servers, causing permission issues to execute intrusion attacks.
7. Directory Traversal Filtering
In a file transfer, the server end will provide required files by user end requests. There are policies to decide if users are permitted to read,write and create directories. DragonWAF can identify “Directory Traversal” attack, starts filtration.
8. Directory Protection
DragonWAF protects default IIS website directory, against any abnormal access requests to exploit sub-directory paths.
9. Customizable Remote Warning Page
Warn remote end of their malicious attacks with a warning message with a “Remote Warning Page”
Users reviews & testimonials
This software is not reviewed yet.