SecPoint WebShop Frequently Asked Questions
What is the shipping Charges?
We have Worldwide Free Shipping for each and every product. So you don’t pay even a single Penny for the Shipping.
In how many days would i receive the Products?
We ship out the product the very same day of receiving the Payment. The maximum delay from our end would be the next working day in case you place the order in night time. It shouldn’t take more than 10 Business days for you to receive it. However you would receive it much Sooner.
I need to receive the Product much sooner than that. Do you offer express shipping as well?
Well, upon request, we can send Products via Express Shipping but you would need to pay actual shipping charges in that case. We can send Products via Express Shipping via DHL and they charges are quite expensive. Please e-mail [email protected] and we will help you with the rates and estimated Delivery Time.
PORTABLE PENETRATOR - Wifi Password Recovery FAQ
What is the Difference Between Portable Penetrator & Portable Penetrator - LIGHT
Portable Penetrator = Auditing of Wired Networks as well as Wi-Fi Networks
Portable Penetrator LIGHT = Auditing of Wi-Fi networks only.
Can i use the system to crack if i am not connected to the network?
Yes, it is only required to be online to get the latest software updates and techniques.
So you can easily be offline when auditing wifi networks for example in a car with no internet.
wifi cracker software
With Portable Penetrator you can recover wifi password.
I assume the mac will know how to recognize this antenna , no driver issues etc.?
Yes the Mac OS X will find it automatically.
wireless pen testing
Portable Penetrator Wifi Password Recovery.
wireless internet password breaker
With Portable Penetrator recover Internet Password.
Recover Wifi Handshake with Portable Penetrator.
Wifi WPS Password Recovery with Portable Penetrator.
wep hack software
With Portable Penetrator can recover WEP keys.
With Portable Penetrator can recover WEP key.
wpa hacking tutorial
Portable Penetrator WPA Recovery.
Do i need the antenna as well?
If you need to audit Wi-Fi networks then you must purchase the pack with the Alfa awus036h Antenna as that's how the system communicates with the available Wi-Fi Networks. You can purchase it locally as well but we have got some really low prices for the antenna. Shipping will be Free to any destination in the world.
What happens after I place an order for Portable Penetrator. I will have to wait for the DVD’s. Right?
No. Once you place an order, we will send you the Download and Installation Guide. So you can download and start using the Program as soon as you place an order. We will also send you A DVD containing Portable Penetrator software on it (for future use). We will also send a Bonus DVD with training videos. Shipping will be Free to any destination in the world.
What is the shipping charges for the DVDs and Alfa awus036h Antenna?
Shipping will be Free to any destination in the world.
How to hack wifi password?
With Portable Penetrator you can easily recover WEP WPA WPA2 WPS wifi password.
tips to crack wifi key
With Portable Penetrator can recover WEP WPA WPA2 WPS Keys.
wpa key discovery
With Portable Penetrator can find the WPA keys.
Portable Penetrator WEP password recovery.
wifi password hacking
Recover Wifi Password with Portable Penetrator.
wps crack timeout
With Portable Penetrator can recover WPS key.
Why do I need the Alfa Awus036 antenna when my Laptop already has a Wi-Fi antenna?
The inbuilt Laptop antenna never has the auditing capability. So you must have the USB Alfa awus036 antenna as well.
How do I connect the Alfa Awus036 antenna?
It’s a USB antenna so you connect it to the USB port.
hack wifi password in windows xp
Can Portable Penetrator run on Windows XP?
Yes you can run easily with VMware Player and recover wpa wpa2 wps passwords.
crack wireless network password
With Portable Penetrator you can recover WEP WPA WPA2 Keys.
crack wpa secure wifi
With Portable Penetrator you can Recover WEP WPA WPA2 WPS password.
Fast Recover your WPA WPA2 Password with the WPS Cracker Portable Penetrator.
wifi cracking software
Recover WPA WPA2 WEP WPS Wifi Passwords.
With Portable Penetrator can easily recover wifi WPA keys.
wifi password finder
With Portable Penetrator You can recover Wifi Password.
Scanning wifi password
With Portable Penetrator you can recover Wifi WPA WPA2 WPS Password.
wifi password hacking tool
With Portable Penetrator Can recover WEP WPA WPA2 WPS.
wpa cracking software
Portable Penetrator Recover WPA WPA2 WPS Keys.
wifi password recovery
Portable Penetrator recover Wifi Password.
Wireless network hacking password
Recover WPA WPA2 WPS Password with Portable Penetrator.
With Portable Penetrator you can recover WPA2 key.
crack wifi by hardware
With Portable Penetrator device you can recover wifi keys.
wpa wep key cracking software
With Portable Penetrator can recover WPA WEP Keys.
WPA2 password cracker
With Portable Penetrator can easily and fast recover WPA2 passwords.
Recover WPA Password with Portable Penetrator.
With Portable Penetrator can recover WLAN password.
wpa hack win7
Portable Penetrator can recover wifi password on Win7
a device to crack wep
With Portable Penetrator can recover wifi WEP password.
wifi security breaker software
Recover your wifi password with Portable Penetrator.
wpa2 crack from windows
Portable Penetrator Recover Wifi Password from Windows.
wifi password hack
Portable Penetrator Recover Password.
security key wifi hack
Portable Penetrator can recover the security key of a router.
how unlock wifi encrypted
With Portable Penetrator can Recover wifi password WEP WPA WPA2 WPS.
how to hack wpa wifi password
With Portable Penetrator can recover WPA Password.
mac os x wpa password cracker
Run Portable Penetrator via VMware fusion on Mac OS X.
wifi password breaker for win 7
Run Portable Penetrator on windows 7 to recover wifi passwords.
wifi password cracker
With Portable Penetrator Recover Wifi Password.
hack a secure wifi
With Portable Penetrator can recover wifi password.
wpa key unlocker software
With Portable Penetrator can recover WPA key.
password wpa scanner mac os
Recover WPA Password with Portable Penetrator on Mac OS X.
wpa wpa2 key checker
With Portable Penetrator you can recover WPA WPA2 Passwords.
With Portable Penetrator recover WPA Keys.
wifi pass mobile
With Portable Penetrator you can get wifi password quickly.
wpa key unlocking software
With Portable Penetrator can recover WEP WPA passwords.
wifi hack wpa
Use Portable Penetrator to recover WPA.
wifi wep crack
Recover Wifi WEP password with portable penetrator.
how to hack wifi
With Portable Penetrator can recover Wifi Keys.
Recover wifi password with Portable Penetrator.
With Portable Penetrator Recover Wifi Password.
wep wpa cracker device
Recover WEP WPA with Portable Penetrator.
Recover WEP password with Portable Penetrator.
Portable Penetrator WPA2 Recovery.
mobile wep cracking tool
With Mobile Portable Penetrator can recover WEP Key.
With Portable Penetrator can recover WPA keys.
how to get wifi password
With Portable Penetrator you can recover your wifi password.
wireless hacking software
With Portable Penetrator can recover wifi passwords.
Recover WPA2 handshake with Portable Penetrator.
wep wpa hacking software
With Portable Penetrator can recover WEP WPA keys.
wi fi crack
With Portable Penetrator you can recover wifi passwords.
web vulnerability scanner portable
With Portable Penetrator you can do web scans.
With Portable Penetrator recover WPS pin code.
With Portable Penetrator can recover WPA keys.
crack wpa2 network
With Portable Penetrator can recover WPA2 network keys.
With Portable Penetrator can recover WPA keys.
I need to check how does the Product works. Can i get a Trial License?
Unfortunately we don't have such option available. But you can check our YouTube Channel for videos explaining more about how our product works. You may also reach Live Chat if you have any questions.
What is the difference between a Portable Penetrator and a Cloud Penetrator?
In Portable Penetrator, the scanning actually takes from your end whereas in case of Cloud Penetrator, the scanning takes place from our server and you don’t have to install any software, etc on your computer. You can use Cloud Penetrator to scan your website for any sort of vulnerabilities whereas Portable Penetrator is a complete Package with Wi-Fi auditing as well.
Does Portable Penetrator have a dashboard view for a user that can be permanently displayed on a screen to show the status of the last scan done?
Yes, Portable Penetrator has a intuitive interface which easy to access button for every feature. It keeps updating itself every 30 seconds to display new details.
Does Portable Penetrator works on Windows Vista?
It runs via via VMWare and we would recommend using it on Windows7 or Mac OS X.
wifi key finder
Easy Recover Wifi Key with Portable Penetrator
My system is a Aspire 8940G with a i7, 4Gig Ram and Win 7 ultimate 64bi. Will Portable Penetrator work on it ?
Yes, it will.
How many PC’s can I install Portable Penetrator on?
Only 1. If you need to use it on multiple computers then you must purchase separate licenses.
Does Portable Penetrator Runs on Mac?
Portable Penetrator runs on Windows, Mac and Linux via VMWare.
wifi password hacking software
Easily recover wifi passwords WEP WPA WPA2 WPS with Portable Penetrator.
Is my computer fast enough for cracking?
Depends which one it is. We recommend i3, i5, i7, Sandy Bridge or better for fastest cracking.
How big are the dictionaries used for cracking?
At the moment our dictionary has over 1.1 Billion entries. You can easily Add or Edit entries or use your own dictionary as well if you want.
How to crack wifi networks and recover password?
Easily target WEP WPA WPA2 WPS networks.
hack wifi password
Recover your wifi WEP WPA WPA2 passwords with Portable Penetrator.
Does your dictionary comes with all Characteristics, Names and Symbols?
Yes, it has over 1.1 Billion entries of known passwords which includes Characteristics, Names and Symbols. You can includes more passwords to it as well.
If the Password on WPA are not words but random character like: 45frTTG 789665x then will the system manage to crack them down ?
WPA and WPA2 is all about finding the password and if it’s does not matched with the one in dictionary then it will not be able to crack.
How long does it take to crack with all the 1.1 Billion entries?
On a normal I7 2.8 GHz it can take up to 5 days or more. On a quad core Sandy Bridge it can take 2-3 days.
Is Portable Penetrator capable of doing a Vulnerability Scan?
Portable Penetrator is our all in one product. It can scan any device which has an IP address over a Wired or Wi-Fi Network for any sort of Vulnerabilities. It can even scan a website from a Web server for any sort of SQL injection, Cross Site Scripting, Command Execution, etc.
Does Portable penetrator has reporting system as well?
Yes it does, the report provides details on each and every vulnerability which were identified by the scanner and provides individual Solutions to each and every loophole separately.
Reaper crack wpa2 psk
Recover your WPA WPA2 keys via new WPS cracking technique.
What is the IP Licensing system all about?
The IP License means that with a 8 IP model you can maximum Scan 8 IP Addresses at the same time. However if you start 8 Scans and in 1 hour all of them are finished then you are allowed to change the IP addresses and do 8 other scans. So as soon as a slot is free you can fill it with any IP and there are no restrictions there.
Can I queue extra IP’s to be scanned?
You sure Can.
For example : If you purchase an 8IP License and you have to scan 20 IP then you can queue up all 20 IP at a time. However you have only 8 empty slots here so only 8 IPs will be scanned at a time and as soon a slot a free, it will automatically be filled with the remaining IP and That’s how the scanning on all 20 IP’s will carried out automatically.
Do I have to install the VMware tools on the Portable Penetrator?
No, Portable Penetrator VMware Image already comes with the VMware tools. So you don't need to install it separately. You can test it by dragging the mouse to the window and see it works without clicking. Please visit our live chat for assistance.
What is the difference between Portable Penetrator and Penetrator?
Penetrator = Vulnerability assessment of various IPs over a Wired Network.
Portable Penetrator = Vulnerability assessment of various IPs over a Wired Network + Wi-Fi Network.
How do I install the Wifi adapter with Antenna?
By simply connecting it to the USB port.
Are you located only in Copenhagen, Denmark?
No, we also have Offices and partners in: The Netherlands, Sweden, USA (WA), Australia, Jordan, Saudi Arabia, Egypt, Greece, Suriname South America and many more.
So even though it’s a VMware, the speed will still be the same right?
There can be a little difference. We tested and got 1650 cracks per second via VMware. Whereas without VMware it was 1700-1750 cracks per second. It depends also how many programs you are running at the same time.
Is everything included in the Portable Penetrator?
Yes, It has every feature that Penetrator has + it also includes Wi-Fi Cracking.
How to add wordlists to help in the WPA/WPA2 cracking? Are there sufficient wordlist for cracking WPA/WPA2 on the Portable Penetrator?
Yes it comes with 1.1 Billion entries in the word lists and they keep getting upgraded. But you can easily use your own Wordlist as well.
How many cracks per second on an Intel I7 when cracking WPA/WPA2 ?
A i7 M640 2.8 GHz gives around 1600-1700 cracks per second.
Is it better to get the Portable Penetrator than the Penetrator?
Yes with the Portable Penetrator you get more. You also get Wi-Fi cracking capabilities.
Do I also get access to Online download of the software while waiting for the DVD?
Yes, once your order is processed you get the login and your License ID. And we we will also send the Download cum Installation guide. So if you want, you can Download and Install Portable Penetrator even before you receive the antenna.
Is the Alfa Antenna included for free with Portable Penetrator Orders?
We do have products with the Antenna and Without the Antenna. Now it's up to you which one would you like to order.
Can I order products to outside of the EU?
Yes, We sell and ship Worldwide.
Can the Portable Penetrator do both Wi-Fi cracking and Vulnerability Scanning?
Yes WEP, WPA, WPA2 cracking as well as Vulnerability Scanning of any IP Address.
Do I get a DVD with the software or only online download?
We will ship out the DVD and will also provide you online Downloading instructions.
How fast do I get my order?
All orders as verified manually. Please allow few hours before we can e-mail you the order details.
Can I order products to the USA?
Yes, We ship worldwide.
Can I get fast support?
Yes, Live chat and email support for fastest reply. You must have seen that Many IT Security companies don't offer Live Chat at all.
Do the power supply work in different countries such as the USA?
Yes and to get a confirmation please mail us at [email protected]
Where can I read all the details about Dell Worldwide support?
Please click Dell Worldwide Warranty for information.
Can I run Portable Penetrator through Parallels on Mac OS X?
We do recommend VMware fusion but we have customers running Parallels 7 on Mac OS X where it works fine.
Does it work with VMware Fusion on Mac OS X?
Yeah it runs great with VMWare fusion on Mac OS X.
Is Portable Penetrator Legal to use?
Yes. Portable Penetrator is a specially hand crafted Wi-Fi tool designed for vulnerability assessment and Penetration Testing. But you must get written Permission to do so. Please check your local laws before attempting to use outside authorized environments. SecPoint and those affiliated are not responsible for your actions.
Does Portable Penetrator supports WEP/WPA/WPA2?
Yes, you can audit Wi-Fi networks with WEP, WPA as well as well WPA2 encryptions.
Can Penetrator/Portable Penetrator do Vulnerability Scanning?
Yes, it does. It scans for many types of security vulnerabilities. In Web Servers, Database servers, Local IP addresses, Firewalls, Routers and more. It scans for SQL Injection, XSS Cross Site Scripting and has an Automatic Crawler.
How do i install Portable Penetrator?
Upon placing an order, we will send you a detailed Installation Guide which will guide you through Downloading and Installing Portable Penetrator.
What if I came across an issue while Downloading, Installing or using Portable Penetrator?
For any technical assistance, please visit our Live Chat team at www.secpoint.com or send an E-Mail to - [email protected]
CLOUD PENETRATOR QUESTIONS
cross site scripting
With the Cloud Penetrator you get full Cross Site Scripting XSS Scanning.
What is Cloud Penetrator?
Cloud Penetrator is our online Vulnerability Scanning utility using which you can scan your Public IP addresses for security vulnerabilities. Basically it scans your websites, Web servers, Routers, for any sort of Loopholes through which a Hacker may try to get in and steal your valuable information or try to Delete/modify it.
Who actually does the scan?
The Scanning actually takes place from our servers.
With Cloud Penetrator you get Google Hack DB and find out if you are vulnerable.
What about Reporting?
Cloud Penetrator generates a Detailed PDF Report for you once the Scanning is Complete. The report provides details on each and every vulnerability which were identified by the scanner and provides individual Solutions to each and every loophole separately.
What would I need to use Cloud Penetrator?
A computer with Internet connection is all that you would need. You don’t need to install anything on it as the Scanning actually takes place from our servers.
How do I use Cloud Penetrator?
You can login to Cloud Penetrator interface just as you login to your G-Mail Account. So basically you navigate to our web interface using any Web-Brower Like Firefox, Chrome, etc and you feed in your Username and Password (That we will Provide after you place an order) and you get access to it. We have an intuitive interface from where you can easily instruct the system to initiate the scan in just 3 clicks.
What about Reporting?
Well, once the scan is complete, the system automatically generates a detailed Report in PDF, HTML and XML formats. The report provides details on each and every vulnerability which were identified by the scanner and provides individual Solutions to each and every loophole separately.
How are the vulnerability Presented in the report?
It shows the vulnerabilities by High Risk, Medium Risk, Low Risk. Where a High Risk vulnerability allows an attacker to fully penetrator the system, a Medium Risk will allow the attacker to get half way and typically by spending more time can gain full system access and a Low Risk Vulnerability can be different types of Information Disclosure that can allow an attacker to prepare for bigger attacks.
Can the system notify me once a new vulnerability is found?
Yes, it can be easily done with the Online Interface. You can instruct the system to send you an e-mail with details as soon as a new vulnerability is found.
How does the report look like?
The report has 2 segments:
1. Overview for reporting to the management - Basic information, Summary and Graphical Demonstration on the vulnerabilities which were found.
2. Detailed information for the Technical personnel to fix vulnerabilities - Detailed information on each and every vulnerabilities which were identified by the scanner with individual Solutions to each and every loopholes separately.
Do you have a sample Report?
Yes, please check the Sample report at - Download Sample Vulnerability Scan Penetrator Report here.
And you can download Sample Vulnerability Scan Summary Penetrator Report here.
Does Cloud Penetrator Scan the Operating System of the Servers as well?
Yes, Apart from scanning the actual website, it also does Scans the Operating System, Routers, Firewalls, any Network Device on the Server, etc for any sort of vulnerability.
Can I setup automated Scanning?
Yes, you can setup automatic schedule scan. So it will scan your IP addresses automatically for example every week or every month for vulnerabilities. Via the Statistics module you can then compare from Week to Week or Month to Month and see how your security level is going up or down. The web-interface really helps a lot as it provides detailed information on everything.
Is Cloud Penetrator capable of finding out SQL Injections on my website?
Yes, It searches for SQL Injection, Web Vulnerabilities, Command Execution and Website Errors on any page found in the worldwide web via its automatic crawl engine. It looks for over 50,000 Vulnerabilities on each and every page of your website.
I need to check how does the Product works. Can i get a Trial License?
We don't have such option available. But you can check our YouTube Channel for videos explaining more about how our product works. You may also reach Live Chat if you have any questions.
With the Protector UTM you get Web Filtering Web Proxy and more.
Protector UTM appliance provides web filtering.
utm firewall clamav
With Protector Appliance you get UTM Firewall and ClamAV support.
With Protector UTM you get Network Firewall.
Protector Firewall UTM.
What are the key features of a Protector UTM?
The Protector main features includes:
Anti Spam with individual user quarantee login - block spam and easy manage.
Anti Spam with ClamAV, Bitdefender, Kaspersky - block virus.
Intrusion Prevention - block hacker / worm attacks.
Wifi Defender - block wifi hackers.
Web Filtering - block time wasting sites keep up productivity.
With Protector UTM you get complete network protection.
What exactly is value of Tolerance Level? Is it possible to check out what is blocked at a given level?
The Tolerance level on the Protector UTM Appliance can be customized.
So on the Web Filter you can configure how strong the tolerance level should be.
This allows you to fine tune how sensitive the filter is.
The best is you use the already pre confirmed levels.
Learn what is a Protector UTM Appliance?
The Protector UTM Appliance is a network box you set up in front of your network.
Then it filters incoming and outgoing traffic. It protectors for Virus, Spam , Hackers / Attackers, Worms, Wifi attacks. It also contains a web proxy, mail proxy and web filtering capabilities. You can also synchronise to a Microsoft Active Directory Server or LDAP for example on linux. The Wifi Defender blocks Man in the Middle attacks and wifi attempts.
Can I Blacklist E-Mail addresses on Protector?
Yes, you can easily Blacklist E-Mail addresses or complete domains. Each user can also login individually and black list addresses or domains. You can easy choose to have the policy for everybody or just individual users.
Can I customize the email signature on Protector UTM Appliance?
Yes, you can customize it in html format, txt format or both. You can also disable it so there will be no signature. The Signature will be in incoming and outgoing mails.
Can I enable disable modules on the Protector UTM Appliance?
Yes, On the Protector UTM Appliance you can enable disable modules just like you want. The modules includes:
Wifi Defender, and more.
Can I run an extra Anti Virus scanner on Protector?
Yes you can run multiple Anti virus vendors at the same time on the Protector UTM appliance. At the moment the supported vendors are Bitdefender, ClamAV, Kaspersky. You can run anyone or all 3 at a time. It scans incoming and outgoing mails for virus so that you can make sure that your mails are clean.
Can I setup MCP rules for the anti spam on Protector UTM Appliance?
Yes you can setup MCP Message Content Protection rules. This way you can block spam with specific content in the topic or footer. For example, you can put specific text in your local language and it will be automatically blocked.
With Protector Appliance you get UTM functionality.
Can I use rbl black lists on Protector UTM Appliance?
Yes Protector UTM Appliance allows you to use a big range of RBL lists. You can easily use the pre configured settings or customize them as per your prefrences. Please visit the following link for more information :
Can i Change the update interval on the Protector UTM appliance?
You can easily change the interval from 1 time per day to every couple of hours or to every 6 hours or to every 12 hours. These settings are fully customizable. This way you can easily optimize how many times you want to receive updates.
Can I Whitelist E-Mail addresses on Protector UTM Appliance?
Yes you can easily white list email addresses for all users or for specific users. You can also white list whole domains. You can also allow individual users to login individually and white list IP addresses valid for his account.
I need to check how does the Product works. Can i get a Trial License?
Unfortunatly we don't have such option available. But you can check our YouTube Channel for videos explaining more about how our product works. You may also reach Live Chat if you have any questions.
Can I customize the Intrusion Prevention databases on Protector UTM?
Yes, you can easily edit the databases and customize the features you want.
Can I setup different groups on the web filter Protector UTM Appliance?
Yes it is very easy to configure different groups. You can synchronise with Microsoft Active Directory LDAP. You can set up different group policies. For example a sales department has one policy, a support department another and the management a third policy.
Can I white list black list IP addresses in the Intrusion Prevention Protector UTM Appliance?
Yes you can easily black list or white list IP addresses in the Intrusion Prevention. It is recommended to white list IP addresses if you have a Penetrator Vulnerability Scanner or doing Penetration testing. Otherwise you might be blocked by the Intrusion Prevention.
Can the Anti Virus scan protocols?
Yes. The Protector UTM Appliance Protocol can scan many protocols such as FTP, HTTP and more. You can easily specify the Protocols you want to scan or the TCP ports.
Do the Antispam support LDAP on the Protector UTM Appliance?
Yes the Protector UTM Appliance has full LDAP Microsoft Active Directory support. This allows you to synchronise the web filter to the LDAP or Active Directory database. And you can setup specific policy for the different users. It also allows to synchronise the Anti Spam quarantine with Microsoft AD active directory so the users can easily login and manage their quarantine.
Do the Protector support Anti Spam Grey Listing?
Yes the Protector UTM appliance supports Anti Spam Grey Listing functionality. This allows you to dramatically reduce the amount of spam you get. You can also white list specific email addresses in the grey listing if you want.
Do the Protector UTM Appliance have a web filter?
Yes the Protector UTM Appliance comes both with a web filter and a web proxy. You can easily enable or disable categories like you want. Then you can block specific categories and ensure productivity and your policy on your network.
Do the Protector UTM Appliance have a web proxy?
Yes the Protector UTM appliance comes both with a web proxy and web filter. The web proxy is also a cacheing proxy allowing your web traffic to be faster. With the web filter you can setup policy to block sites such as social media. This way you can block sites like that during work hours to improve productivity time.
Does the Protector UTM Appliance support Microsoft Active Directory?
Yes the Protector has full support for Microsoft Active Directory and LDAP on Linux. You can see the full support guide on how to install it on our support page. You can enable the Microsoft Active Directory to synchronize Mail accounts, Web Filter accounts and more. This allows for easy integration to your infrastructure.
Do you sell anti virus?
Yes we sell Anti virus software for client computers such as windows. And as the Anti Spam Virus mail gateway scanning on the Protector UTM appliance. Please Contact us for more information.
Can the Protector UTM do Mail Archive?
Does the Protector UTM have mail archiver functionality? Yes the Protector allows to store incoming and outgoing emails. You can easily enable or disable the functionality. The minimum capacity is 250 Gig. So be sure to store all your incoming and outgoing mails for security.
How can I manage the anti spam & anti virus on the Protector UTM Appliance?
You can easily login to the interface and enable disable the different anti virus vendors. For the Anti Spam you can easily configure the different features. You also have an easy to manage User Quarantine section. Each user can login individually and manage their anti spam.
How do I configure the Protector UTM Appliance?
Please visit the following link for details :
How long time does it take to install the Protector UTM Appliance?
When you plug in a Protector UTM appliance it runs in Bridge mode. You can see right away if it is working when you simple visit a website like www.google.com. After you run the wizard and set the configuration can take about 5 minutes. You will then see mails going in and the web filter blocking un wanted sites. So you can set it up very quickly and if you need any help you simple go on our live chat for fast support.
How Often do the Protector UTM Appliance get updated?
The Protector UTM appliance gets updated every 6 hours by default. It received Anti Virus updates, Vulnerability database signatures, Anti Spam Databases, Web Filter Databases and more. You can also customize how often you want it to update for example 1 time a day. It is recommended to update every 6 hours.
Is it possible to import their own white black list ?
Yes on the Protector UTM appliance you can easily import / export black lists or white lists. This includes for the Anti Spam, Web Filtering, Intrusion Prevention, Content Filter, Wifi Defender and more.
What is required to install the Protector UTM Appliance?
You can simple install the Protector UTM Appliance virtually like in VMware player, esxi or other virtual machine. If you are installing the hardware appliance version: You just need to plug in the router in network port A and the local lan in port B so it runs as Bridge mode.
What is the Price of a Protector UTM Appliance?
Please visit the following Link for more details :
What is the Wifi Antenna used for on the Protector?
The Protector uses the Wifi antenna in the Wifi Defender module. This allows protecting for Wifi attacks such as Spoofing, de-authentication attacks and more. It also scans the wifi channels and warns when new unauthorized connections come.
Where to buy Kaspersky Bitdefender
Please visit the following Link for more details :
With the Protector you get full Firewall protection.
Do i need a Protector UTM?
Well, IT Security is very important these days to ensure smooth operation of various business activities in any organization. We recommend and have Protector UTM in all sizes to serve customers from Small to Large Businesses. The Protector UTM appliance begin at a 3 user model and ranges up to a 1000 User model.
Where can I get more information about the Protector UTM Appliance?
Please visit the following Link for details :
Which countries do you ship the Protector UTM Appliance to?
SecPoint do ship worldwide with DHL to most countries in the world. We are shipping to Asia, USA, Canada, South America, Europe and more. If you are not sure if we are shipping to your local country please email and ask us.
Which mail servers are the Protector UTM Appliance Compatible with?
The Protector UTM Appliance is compatible with most mail servers. It works with Microsoft Exchange, Lotus notes, Linux Sendmail, Qmail, and many more. The Protector runs infront of the mail server where it will sent clean mail to the mail server behind for example Microsoft exchange. You can see right away that it is working by seing mails coming in and going out. It scans both incoming and outgoing mails for virus, spam, phishing and dangerous content. Then you can be sure your mail traffic is secure.
appliance for anti spam and proxy
With Protector UTM Appliance you get Anti Spam and Web Proxy.
proxy hardware device
With the Protector UTM you get a proxy hardware device.
Can I create network templates on the Penetrator?
Yes you can easily do a range scan of a network. Then you will identify all active IP addresses on the network. From those you can create an audit template. This template you can use to make scans , schedule scans and more.
How does the Portable Penetrator crack wpa passwords?
The Portable Penetrator will drop a wifi bomb or dis authenticate a single user. When the user reconnects it will sniff the connection handshake. Once you have the connection handshake you can do the brute force. It support multiple languages and a total of 1.1 Billion entries. You can attack your own password and see if it is secure enough.
How does the Portable Penetrator crack wpa2 passwords?
The Portable Penetrator uses 1 Billion entries to crack WPA2 passwords. It sniffs the connection handshake of an access point. When a user connects it get the handshake and you can crack it.
Can i crack wpa wpa2 without users?
You need to capture the connection handshake to conduct a brute force attack. If you attack a router without users the Portable Penetrator will go in to sniffing mode and once a user connects it will capture the handshake.
How does it Crack WPA?
The Portable Penetrator cracks WPA by capturing the WPA / WPA2 Connection Handshake. It goes to sniffing mode and waits for a user to connect then it capture the handshake. You can also force one of the users to reconnect to get the handshake faster. Or you can drop a wifi bomb then all the users gets disconnected from the wireless access point. Once they reconnect it gets the handshake. When it has the handshake it will start cracking it with updated 1.1 billion word list entries.
How to crack a Wifi password with the Portable Penetrator?
The Portable Penetrator can crack WEP WPA WPA2 encrypted networks. When cracking WEP networks it will sniff the traffic and crack it. For WPA WPA2 encrypted networks it will sniff the connection handshake. Afterwards it will brute force the password. It has more than 1.1 billion entries.
What is a WPA cracker?
A WPA cracker means that it gets the WPA connection handshake of a wifi encrypted network. It can be both WPA or WPA2 encryption. Once it has the handshake a word list brute force attack can be started. The word lists has more than 1.1 billion entries.
What is the difference between backtrack and Portable Penetrator?
Well, there are many. In backtrack all is command line here you do it from the interface. We have our own vulnerability scanner engine with 50.000+ signatures. If you do pen testing consulting to your customers then you can brand the reports and sell as a service. You get 1.1 billion word lists. You get support someone that can help you.
What is the wifi Antenna used for on the Portable Penetrator?
The Wifi antenna for the Portable Penetrator is used to audit the security of WEP, WPA and WPA2 encrypted wifi networks. We recommend the Alfa Awus036H wifi antenna. This antenna can be used to do WEP cracking WPA cracking and WPA2 cracking. The wifi antenna works as a radio and can listen on all chennels and inject data.
Which hardware is needed to run the Portable Penetrator VMware version?
For best performance it is recommended 1-2 Gig memory allocated to the Portable Penetrator. So if you are running on Windows with a total of 2 Gig memory you can allocate 1 Gig to the Portable Penetrator VMware. For the CPU it is recommended I7 and above. The power powerfully CPU the faster WPA cracking.
Can I see clear statistics on the scannning performed at Penetrator?
Yes, You can very easilty check the statistics and compare scan by scan or month by month. You can also download the statistics report as html or pdf format.
Does Penetrator scans Operating system as well for any sort of Vulnerability?
Yes, Penetrator & Portable Penetrator can scan any operating system such as, Windows, Mac OS X, Linux, Unix,BSD,OS/2, IOS, Android and more operating systems. Further more it can also scan hardware devices such as firewalls,routers,voip equipment, network appliances and more for vulnerabilities.
Can Penetrator perform VAPT (Vulnerability Assessment & Penetration Testing) ?
Yes, Penetrator comes fully loaded with Vulnerability Scanning, Vulnerability Assessment & Penetration Testing capabilities. There is a user friendly interface that allows you to easily conduct the security assessment.
Why do i need the Wi-Fi Antenna with Portable Penetrator?
The Wi-Fi Antenna on Portable Penetrator is used to conduct Wi-Fi Security Assessment. This allows a user to audit the security of his Wifi Networks and do real WEP WPA and WPA2 Cracking in order to make sure the wifi network is secure.
Do Pen Testing with Penetrator Vulnerability Scanner.
With the Penetrator you get vulnerability management.
With the Penetrator you can perform penetration testing on your network.
With Penetrator you can do pentesting.
With the Penetrator you can do vulnerability scanning.