Home | Submit a file | New | Categories | RSS Feeds | Blog
Free Software Advertising
"DragonWAF 2010 Trial (Eng)" snapshot
DragonWAF 2010 is a host-based web application firewall, targeted to filter and prevent malicious coding attacks at personal and small-to-medium business web sites hosted on Microsoft IIS Web Server.
A personalized faxing software can reach thousands of people with no limit. This easy to use product is your ideal communication tool for fax marketing, customer communication, event notification, newsletter publishing and more.
Asoftech Photo Recovery is an easy to use data recovery software available to restore your photos, music and videos from local PC and removable devices. No matter multimedia files have been deleted accidently, or memory card has been formatted.
17% of users liked this software
December 25, 2009
Description from the Publisher
DragonWAF Identification Technologies
1. SQL Injection Prevention
Remote attackers send requests to gain access on IIS web server, causing data leakage or data deletion. DragonWAF can identify the attacks, analyze, filters them.
2. Buffer Overflow Protection
Buffer Overflow is an anomaly that stores data in a buffer outside the memory the programmer set aside for it. The extra data overwrites adjacent memory, which may contain program variables and program flow control data. DragonWAF can control the request length.
3. HTTP Methods Protection
Illegal commands that will cause data loss or tamper on web server, DragonWAF administrators can analyze, classify, filter and protect web servers from any incoming requests.
4. Shellcode Exploits Prevention
A standard English website environment is free of high-bit commands communication that could cause damage to server data, whereas in other language there will be complicated coding or high-bit requests targeting on IIS Web Servers.
5. Encoding Attack Prevention
The variety of “encoding attacks” are sent to IIS Web Server are deceitful, trying to beat default policy. DragonWAF is able to identify such attacks, analyze risk level and filter them.
6. Keyword Strings Filtering
DragonWAF is able to eliminate such commands. This type of command attempts to create a buffer overflow on web servers, causing permission issues to execute intrusion attacks.
7. Directory Traversal Filtering
In a file transfer, the server end will provide required files by user end requests. There are policies to decide if users are permitted to read,write and create directories. DragonWAF can identify “Directory Traversal” attack, starts filtration.
8. Directory Protection
DragonWAF protects default IIS website directory, against any abnormal access requests to exploit sub-directory paths.
9. Customizable Remote Warning Page
Warn remote end of their malicious attacks with a warning message with a “Remote Warning Page”
Users reviews & testimonials
This software is not reviewed yet.