PDF documents require
Adobe Acrobat Reader,
available free at:



Security Files


Password Keeper

Password Safe

Muddle file encryption






MD5 Command






NetCat for NT(*)

NetBus Pro (Shareware)(*)


nmap Win32

CIS Internet Scanner

DDos Ping

Vision Port/Process Mapper(*)

Attacker IP Listening

UDP Flood

TCP port blaster


IP Port ScannerV3(*)

IP Port ScannerV4(*)

IP/TCP/UDP Port Scanner


SNMP Scanner(*)

File Watch


Cain & Abel



Base64 Decoder


Risk Guide - PDF

W2K Disaster - DOC

SMTP Open-relay - PDF(*)

Securing DNS - PDF


Application Security - PDF

Application Security - PDF


Cisco PIX Examples PDF

Cisco PIX Syslog PDF


FireWall ARP Program

FireWall Information Program

FireWall Commands

FireWall Monitor Command

Web Server Attacks


Check Point to Cisco







home mail contact Us site map

Stores a list of accounts / passwords (AES / Twofish algorithm)

Stores a list of accounts / passwords (Blowfish algorithm)

Stores a list of accounts / passwords (Blowfish algorithm)

Muddle Blowfish File Encryption


Blowfish is a symmetric block cipher, 64-bit block, that takes a variable-length key, from 32 bits to 448 bits, making it ideal for both domestic and exportable use. Blowfish was designed in 1993 by Bruce Schneier as a fast, free alternative to existing encryption algorithms.

MD5 128-bit Hash - command line utility (RFC1321)

MD5 128-bit Hash - GUI Window

File Integrity Checker - 11 Hash / Checksum (command line)


Remote online password cracker tool using word lists

Vigenere Cipher - VB 3.0 (Polyalphabetic)

NetCat 1.11 for Win NT (TCP/UDP tool)

NetBus Pro 2.10 - Remote administration / spy tool

nmap Win32 GUI - TCP/UDP port scanner (req. Winpcap)

nmap Win32 - TCP/UDP port scanner (command line)

CIS - Cerberus Internet Scanner - Vulnerability Checking (NT)

Remote net scanner for Distributed Denial of service programs

Map TCP/UDP IP Ports to local applications processes

TCP/UDP IP Port Listening warning program

UDP Packet sender to specified IP and port number

TCP port blaster - command line tool


IP Port Scanner, Pinger and Hostname resolver

IP Port Scanner - TCP/UDP, Hostname resolver (WIN2K)

IP Port Scanner, Ping Sweeper, TCP, UDP

Port Scanner (TCP & UDP) - Command Line

Scans for open SNMP services within an IP range

Monitors a file for selection or changes in size

Displays a workstations active filters - Command Line

Password recovery tool - sniffing the network

Windows NT/2K remote password hash grabber

Tone locator - Dials numbers looking for tones

Base64 Decoder - Windows freeware


Risk Management Guide for IT Systems - NIST

Windows 2K Server - Disaster Recovery Guidelines

Telnet procedures to test SMTP Open-relay servers

Securing an Internet Name Server (NT / BIND) - PDF


Programming Security - Checklist

Programming Security - Guidelines


PIX/ASA 7.x w 3 internal network examples

PIX 7.x - Syslog examples


Check Point FireWall-1 ARP Tool (Windows 2000)

Check Point FireWall-1 CPinfo Tool (Collection utility)

Check Point FireWall-1 Commands

Check Point FireWall-1 Monitor (Trace) Command

Web application security attacks (Power Point) SPI


Cisco Security Conversion Tool (SCT) - Java runtime required

In Check Point Firewall, the NAT rules are unidirectional, which means the device needs to have two separate NAT rules for the forward and reverse flow for the NAT to happen. This is even true for static one-to-one NAT rules. In Cisco devices, NAT rules are bidirectional so Cisco SCT tool skips one of the Check Point unidirectional NAT rules.

Cisco enforces firewall rules on an interface-specific basis. However, Check Point enforces firewall rules globally, meaning without regard to the interfaces through which the data passes. This does not tend itself well to the Cisco architecture.





"It is an equal failing to TRUST everybody, and to TRUST nobody" - English Proverb



“Gentlemen do not read each other’s mail.”
Secretary of State Henry Stimson 1929-1933
(Closed  "Black Chamber" MI-8, 1929)


Base64 Encoder / Decoder

Base64 is a transfer encoding that uses the
characters A–Z, a–z, and 0–9 in that order for the first 62 digits. The symbols chosen for the last two digits vary considerably between different systems.
Commonly used with the
MIME, (Multipurpose Internet Mail Extensions) specification, as listed in RFC 2045. MIME does not specify a fixed length for base64-encoded lines, but it does specify a maximum length of 76 characters.



PCI DSS - Payment Card Industry (PCI) Data Security Standard (pdf)


Any material furnished by Nickerson Consulting Group, N-cg.net, is furnished on an "as is" basis. Nickerson Consulting Group makes no warranties of any kind, either expressed or implied as to any matter including, but not limited to, warranty of fitness for a particular purpose or merchantability, exclusivity or results obtained from use of the material. Nickerson Consulting Group does not make any warranty of any kind with respect to freedom from patent, trademark, or copyright infringement.


© copyright 2009 created by www.ITCharts.com