|
 |
 |
- Network security auditing, scanning and detecting vulnerabilities
- Monitoring access from network to shared files and folders
- Detecting and controlling network data access policy violations
|
|
|
|
 |
 |
- Recovering software products keys from any computer
- Retrieving software product keys from network computers
- Finding and revealing license keys from old hard drive
|
|
|
|
 |
 |
- Recovering lost passwords for popular email programs and services
- Revealing forgotten passwords saved in web browsers
- Retrieving forgotten passwords from MAC computers
|
|