(sometimes we provide two download links because it may happen that the main server / link is overloaded or slow or non responding - the files are identical. Just choose one, save to the Desktop, double click to install)
Disclaimer: to our best knowledge this download comes from a website that is
safe (the last time we checked it, it was), but for your peace of mind (and better safe than sorry) we advise you to run an
antivirus on the downloaded file. Do not rely on MSWindows, Internet explorer, or on the electronic signature: a unsigned download is usually as safe as a signed one, signed just means the author paid Microsoft or Verisign for a stamp, it does not mean verified. Please kindly
report us problems with detail (click here to report), if any.
A Firewall just blocks certain ports and connections, but most computers and especially servers are bound to have open ports if they are connected to the internet. This is where the IDS comes into play. It analyzes all data that arrives at your system and warns you if something suspicious is going on.You want to be really secure? Then you need an IDS! If your System is under attack, you will know with XRAY. Try
(
You want to be really secure? Then you need an IDS! Only a Firewall wont help.)
Many people tend to think that they are not a interesting target for Attackers, but thats where they are wrong. End-User systems are perfect for an Attacker to hide his trail and launch attacks from your System so he cant be traced back. A Firewall offten doesnt help against Attacks and it doesnt show you when an unknown attack is launched against your system if its directed at an port that is allowed to be accessed from the outside on the Firewall. Thats where the IDS comes into play. It analyzes EVERY packet that your System receives over the LAN or WAN and if it detects suspicious behaviour, it will notify the Administrator and log the Data for future investigation.
Not only Attackers are a problem, but also automated software,Viruses and Worms which scan the internet for vulnerable Hosts to infect by first launching an Exploit against all Systems they find and then install backdoors on the compromised system and your host will start scanning itself for new targets.
Also a big problem for the computer industry are so called 0day Exploits which are bugs not known to the public and therefore noone can patch properly against such attacks. With Xray's detection mechanisms it is possible to even spot some 0day exploits since it doesnt only look for specific patterns but also suspicious data that is contained in most exploit codes.
You want to be really secure? Then you need an IDS! Only a Firewall wont help much against attacks.
If your System is under attack, you will know with XRAY. Try our Demo now and see yourself !
security, secure, intrusion detection system, intrusion, detection, system