Hi, my name is Kasha Blake. Web Developer/ Server Admin: Focused on Mobile responsive design and Search engine optimization



security padlocks

These are programs used to assess the weaknesses of computers, applications, networks and computer systems. They may be used for legitimate purpose as part of vulnerability management or taken advantage of by hackers to gain unauthorized access to computers and networks.


The most widely-used intrusion tools boasting of over 500,000 registered users and 4 million downloads. Hailed as one of the best open source software in the world, the program is capable of real-time traffic analysis and packet lagging.


Microsoft Baseline Security Analyzer performs local or remote scans of Windows computers and servers. It identifies the absence of service packs, security patches and other errors in configurations. It supports different versions of Windows from Windows XP to Windows 8.1. The program is relatively easy to use and operate.

Nexpose Community Edition

This vulnerability scanner is full-featured and easy to set up. It scans web applications, network, operating systems, virtual environments and databases. It runs on Windows, Linux and other virtual machines. It scans sites and lists assets and vulnerabilities and other information on how to fix the errors.


A simple tool used for local scanning of Windows desktops and servers. It lists all the checked settings with a Passed or Failed result. The user will also see links and references about the vulnerability and steps to fix them. The program complements and works well with the MBSA tool.

Qualys FreeScan

The program offers free use for up to 10 scans of IPs or URLs of remote or local servers and machines. It conducts security checks for malware, SSL issues and other network-vulnerability issues. You need to download the virtual machine software if you plan to scan your internal network.


The Open Vulnerability Assessment System is a free network security scanner program that runs on Linux. It is one of the easiest scanners to install and use but also one of the most feature-rich platforms that is available for free. It supports simultaneous scan tasks that can be scheduled by the users.


Well-known for its integrated patch management tools, malware protection features, cloud infrastructure, virtualized system and firewall, this program is one of the most popular vulnerability scanners in the world. Its popularity could be attributed by its robust support for related technologies such as mobile devices, different operating systems, hypervisors and network devices.


A bug-tracking program used by administrators in project management. The web-based software provides real-time access to data from any place, has multi-language capability, multiple project management, updated email system that imports emails and coverts them to trackable records, and integrated source control systems including Microsoft Visual Safe.


A vulnerability-testing tool particularly created to assess Microsoft SQL database Server by conducting complete inspection of risks affecting Microsoft SQL database. This highly-configurable and intuitive tool utilizes hundreds of individual checks on the server being tested and can generate lockdown scripts to secure the server once threats are uncovered.


Another bug-tracking software that may be used for different types of projects including small businesses and large enterprise applications. Among its features are a simplified dashboard where users can monitor their assigned tasks, workflow capability allowing the assignment of bugs to different individuals and an audit trail or defect history.


The program runs on various operating systems although it was first created for Microsoft Windows only. It is an open source application of Telnet and SSH for both Windows and UNIX platforms. Simon Tatham wrote the original program, which is now maintained and supported by a group of volunteers in the open source community.


An open source defect-tracking software that allows users to keep track of bugs and problems in their products. It has become the standard defect-tracking system from which other programs are compared to because of its superior performance. Well-known users of the software include NASA, Redhat, and WikiMedia Foundation.

VisionApp Remote Desktop

Network administrators use the program to access and manage multiple desktops and servers. Administering Windows, Macintosh, Citrix and Linux/UNIX is possible through its integrated connection protocol. Management of remote connections to multiple clients and servers is simplified through the use of the vRD2010 command and control center.


A network monitor available as either a console application or Windows application with Graphical User Interface. It shows a graphical representations of the traffic within the monitored network, including its download and upload speed. The program is commonly used by network administrators to locate the cause of a sluggish network performance.


A free and easy-to-use open source software formerly known as Wireshark until a name change sometime in 2006. It runs on just about every operating systems on the market today. Developers use this protocol analyzer to analyze and troubleshoot networks, software protocol development and for education purposes.


Used as a penetrating application to test the vulnerabilities of a network’s defenses, the program compiles and generates all vulnerability information. It is useful in developing IDs signature and penetration testing. Metasploit Framework, a sub-project under Metasploit, is best known as an open source software used to execute exploit code on remote computers.


Kasha Blake

Web Developer/ Server Admin: Focused on Mobile responsive design and Search engine optimization