| |
From the creator:
Hack Tracer is an intrusion detection and prevention tool. It blocks
unwanted traffic, logs the contact, and allows you to easily trace it
back to the source. Hack Tracer also gives you access to a user
community working together to defend itself from hackers and other
potential threats.
_____________
DOCUMENTATION
Help information is hosted on the Hack Tracer web site. When you select a
help button or menu item your browser will be opened and a help screen
loaded from the support web site. Be sure you are online when using
Hack Tracer help.
The most up-to-date information is in the online help. Be sure to say
'Yes' when the installer asks you if you want to view the online help page.
____________
REQUIREMENTS
To use Hack Tracer you will need:
· A '95-based' version of Windows, i.e. Windows 95, 98, or 98SE.
Hack Tracer does not currently support NT 4.0 or Windows 2000.
· A connection to the internet
· Minimum hardware is considered to be a Pentium class system.
· WinSock2, this is the default installation for all windows
platforms except for the very oldest Windows 95. The program will
detect if WinSock2 is missing and inform you how to upgrade.
It is required for security purposes (the original Win95 WinSock has
several known security issues).
________
USING HT
Using HT is very simple. You install it and go. HT will block
any unwanted traffic from reaching your system. Unlike lesser
protection systems and 'evil port monitors' HT is able to not only
detect the traffic but also track it back to it's source. And
unwanted connections are destroyed before they get to the Windows
tcp/ip stack, meaning total protection for you and 'stealth' mode
when you are connected to the internet.
HT is not recommended for use on LANs, it was designed to protect
individual computers connected to the internet through DSL, ISDN,
Cable or dial-up Modem.
HT can be used in 'connection sharing' LANs of only a few computers.
To use HT in this type of setup you must add the IP addresses of the
other computers in your LAN to the 'Golden IP' tab in the HT Options.
When an undesired or unexpected event is detected the source is
traced and the event is logged. You can then review these logged
items in the Log View. Access options, the log view and other items
available from HT by right-clicking on the HT icon in your system
tray.
You can log specific events with the central web server by using the
'More Information' link in the Event Details box. This submits the
event data to our central server and also shows you a web page that
may contain additional information about the event type and port.
Submitting data to our central server helps us to establish patterns
of activity, making us able to provide back better data to you and
help authorities in stopping Hackers and other problem users.
To see news updates use the 'News' icon in the Log View toolbar.
See the online help for more information.
__________________________________
ABOUT SHARP TECHNOLOGY and NEOWORX
Hack Tracer is a joint development effort of NeoWorx and SHARP
Technology.
SHARP Technology, Inc. is a Delaware corporation involved in the
licensing, development and distribution of Internet related products
and services. The company's future growth is driven, in large part, by
the aggressive pursuit of partnerships, mergers, acquisitions and
public market opportunities. SHARP is a privately-held corporation.
NeoWorx is a privately held company specializing in high quality tools
for today's internet users and developers. We pride ourselves on
intuitive design, uncompromising quality and performance, and proving
that quality software can STILL fit on a floppy!
Thanks from all of us at SHARP Technology and NeoWorx
SHARP Technology Inc. NeoWorx Inc.
http://www.sharptechnology.com http://www.neoworx.com
Download Now
(1,103 KB)
|